Inicio  /  Applied Sciences  /  Vol: 12 Par: 17 (2022)  /  Artículo
ARTÍCULO
TITULO

A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher

Agus Winarno and Riri Fitri Sari    

Resumen

Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely used in IoT implementation is MQTT. By default, MQTT does not provide data security features in the form of data encryption. Therefore, this research was carried out on the design of Secure End-to-End Encryption MQTT with Block Cipher-Based Lightweight Cryptography. The protocol is designed by utilizing the Galantucci secret sharing scheme and a lightweight cryptographic algorithm based on a block cipher. The algorithms used include AES-128 GCM mode, GIFT-COFB, Romulus N1, and Tiny JAMBU. We tested the Secure End-to-End for MQTT protocol on the ARM M4 and ESP8266 processors. Our testing results on NodeMCU board, Tiny JAMBU have an average encryption time of 313 μs" role="presentation">µsµs µ s and an average decryption time of 327 μs" role="presentation">µsµs µ s . AES-128 GCM mode has an average encryption time of 572 μs" role="presentation">µsµs µ s and an average decryption time of 584 μs" role="presentation">µsµs µ s . GIFT-COFB has an average encryption time of 1094 μs" role="presentation">µsµs µ s and an average decryption time of 1110 μs" role="presentation">µsµs µ s . Meanwhile, Romulus N1 has an average encryption time of 2157 μs" role="presentation">µsµs µ s and an average decryption time of 2180 μs" role="presentation">µsµs µ s . On STM32L4 discovery, Tiny JAMBU had average encryption of 82 μs" role="presentation">µsµs µ s and an average decryption time of 85 μs" role="presentation">µsµs µ s . AES-128 GCM mode has an average encryption time of 163 μs" role="presentation">µsµs µ s and an average decryption time of 164 μs" role="presentation">µsµs µ s . GIFT-COFB has an average encryption time of 164 μs" role="presentation">µsµs µ s and an average decryption time of 165 μs" role="presentation">µsµs µ s . Meanwhile, Romulus N1 has an average encryption time of 605 μs" role="presentation">µsµs µ s and an average decryption time of 607 μs" role="presentation">µsµs µ s . Our experiment shows that the fastest performance is produced by Tiny JAMBU, followed by AES-128 Mode GCM, GIFT-COFB and Romulus N1.

 Artículos similares

       
 
Kultigin Demirlioglu and Emrah Erduran    
Bridges serve as vital engineering structures crafted to facilitate secure and effective transportation networks. Throughout their life-cycle, they withstand various factors, including diverse environmental conditions, natural hazards, and substantial lo... ver más
Revista: Applied Sciences

 
Li Wang, Xiaosong Yang and Jianjun Zhang    
For video style transfer, naively applying still image techniques to process a video frame-by-frame independently often causes flickering artefacts. Some works adopt optical flow into the design of temporal constraint loss to secure temporal consistency.... ver más
Revista: Applied Sciences

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Yang Yang and Guanghua Song    
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing... ver más
Revista: Information

 
Fatemeh Stodt and Christoph Reich    
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i... ver más
Revista: Computers