Abstract

Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in IoT applications. This research addresses this gap by presenting the design, implementation, and practical evaluation of a rapidly deployable IoT architecture with embedded data security. Utilizing open-source off-the-shelf components and widely accepted encryption algorithms, this research presents a comparative study of Advanced Encryption Standards (AES) with and without hardware accelerators and an eXtended Tiny Encryption Algorithm (XTEA) to analyze the performance in memory, energy, and execution time. Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers. Additionally, software implementation of AES on 8-bit PIC architecture required 6.36x more program memory than XTEA.

Highlights

  • Internet of Things (IoT) is a world-wide network of interconnected objects that are uniquely addressable, based on standard communication protocols [1]

  • The “Thing” in IoT can be anything from toasters, thermostats, wearable electronics, assistive devices, smart-vehicles, structural health monitoring systems, environmental monitoring, agriculture, smart homes, and industrial automation systems [2,3]

  • IoT devices are constrained with low memory, limited power, and computational capabilities to implement traditional encryption algorithms [6,7]

Read more

Summary

Introduction

Internet of Things (IoT) is a world-wide network of interconnected objects that are uniquely addressable, based on standard communication protocols [1]. More devices are connected with the internet, as pervasive computing proliferates at a blistering pace to reduce human intervention, increase ease of use and improve efficiency. As the IoT system collects and exchanges sensitive, private data, ensuring security across all levels of the architecture is essential yet most IoT devices at the end nodes have significant security concerns. IoT devices are constrained with low memory, limited power, and computational capabilities to implement traditional encryption algorithms [6,7]. In resource constrained IoT architectures, it is necessary to employ a lightweight encryption to provide security to sensitive information while minimizing the overhead in memory, time [8] and power [9]

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.