Abstract

Radio Frequency (RF) communication plays a vital role for sensor node data transmission, which typically runs on top of lightweight protocol such as Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP). Introducing a cryptographic scheme to the process is known to be the common and most efficient method to protect RF communication. This paper presents the performance comparison of AES-encrypted data transmission over RF communication via Raspberry Pi boards, experimented on a client-server architecture. The performance analysis is measured based on throughput metric and the transmission time delay when sending three types of payload which are, a plaintext data, a ciphertext with padding and a ciphertext without padding. The result from the study indicates that there is a significant difference in data transmission time between the three types of data due to the data expansion factor. The result also showed that adding padding to the ciphertext has increased the data size slightly but not significant enough to affect transmission time of ciphertext.

Highlights

  • Today, internet is migrating from connecting people to connecting things, leading to the new concept of Internet of Things (IoT)

  • One of the most efficient wireless communication for IoT sensor nodes is via Radio Frequency (RF), typically run on top of Constrained Application (CoAP) and Trivial File Transfer Protocol (TFTP) protocols which provide zero security mechanism [1]

  • Advanced Encryption Standard (AES) [4] in conclusion could be seen to be faster in terms of speed and systematically efficient in terms of performance compared to other encryption algorithms

Read more

Summary

Introduction

Internet is migrating from connecting people to connecting things, leading to the new concept of Internet of Things (IoT). A popular method to protect the sensor node data transmission over RF in a more secure way is by implementing the cryptographic algorithms [2]. Symmetric key cryptography is the algorithm that uses a secret or private key to lock (encrypt) and unlock (decrypt) [3] the data in a particular way between two or more parties. The works provided alternate solution for various stakeholders to execute a rapid product research and development of any cryptographic protocol for smart devices This previous work has become our motivation to further the research study in RF technology with three ultimate aims in order to improve the data security using encryption schemes to be implemented on IoT embedded devices. The proposed work comprises of a persuasive argument that it could make a noteworthy contribution on a topic that is important to the development of IoT embedded devices, in enhancing the security of the data uploaded using a low budget devices

Related Works
Methodology
Performance Evaluation
Transmission Time Difference when Sending Plaintext and Ciphertext
Data Expansion Rate
Results and Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.