Abstract

In the era of IoT, embedded systems are becoming the cornerstone of many IoT related applications, such as smart cars and wearable devices. However, embedded devices have numerous constraints and requirements, including stringent area and power, reduced cost and time-to-market, and increased speedup. Furthermore, these applications are becoming increasingly compute/data-intensive requiring more processing power. Also, especially for IoT related applications, security is another major issue in resource-constrained embedded devices. Although cryptographic algorithms are widely used to ensure the security of these applications, commonly used ones, such as AES, are unsuitable for highly constrained embedded devices, due to their sheer complexity. Hence, several lightweight cryptographic algorithms were proposed in the literature that might be better suited for embedded devices. From these, SPECK and SIMON, introduced by NSA, are the two most popular ones. Another important challenge is how to incorporate the cryptographic algorithms in to embedded devices, efficiently and effectively, without compromising the integrity of the compute/data-intensive applications running on these small-footprint devices. Our previous analysis demonstrated that FPGAs are currently the best avenue to support compute/data-intensive applications running on resource-constrained embedded devices, due to FPGA’s many attractive traits, including, post-fabrication reprogrammability, dynamic and partial reconfiguration capabilities, and reduced time-to-market. Also, FPGAs can be utilized to provide several advantages/features required for the embedded device’s security, such as cryptographic algorithm agility, algorithm upload, algorithm modification, and resource efficiency. In this research work, we introduce novel, unique, and efficient dynamic and partial reconfigurable hardware architectures for the most popular SPECK and SIMON algorithms on embedded devices, considering the constraints associated with these devices and the requirements of the applications running on embedded devices. We also introduce unique system-level architectures for our proposed designs. To the best of our knowledge, no similar work exists in the literature that provides dynamic and partial reconfigurable hardware for SPECK and SIMON, and also provides system-level architecture. Our dynamic and partial reconfigurable hardware designs achieve 28% space saving compared to its static reconfigurable hardware, and 59 times speedup compared to its software counterpart.

Highlights

  • With the advent of Internet of Things (IoT) era, embedded systems are becoming the cornerstone of many IoT related applications, such as intelligent transportation systems, implantable and wearable medical devices, smart grids, and smart homes [1],[2]

  • For the dynamic reconfigurable hardware (DRH), we introduce novel and unique dynamic and partial reconfigurable hardware architectures for both SPECK and SIMON in such a way that after processing one cryptographic algorithm (e.g., SIMON), the specific region of the chip consisting of the cryptographic algorithm is dynamically and partially reconfigured to another cryptographic algorithm (e.g., SPECK), and that algorithm is processed

  • For the performance-gain comparisons between the DRH and static reconfigurable hardware (SRH), we focus on the individual execution times of the DRH and SRH designs with SPECK and SIMON algorithms

Read more

Summary

Introduction

With the advent of Internet of Things (IoT) era, embedded systems are becoming the cornerstone of many IoT related applications, such as intelligent transportation systems, implantable and wearable medical devices, smart grids, and smart homes [1],[2]. The IoT related applications running on these devices are becoming increasingly complex (compute/data-intensive), requiring VOLUME XX, 2017. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. As the complexity and utilization of embedded devices in these applications expands, security is becoming another major issue in these resource-constrained embedded devices [3],[7]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call