Compare encryption performance across devices to ensure the security of the IOT

The internet of things (IoT) combines many devices with various platforms, computing capabilities and functions. The heterogeneity of the network and the ubiquity of IoT devices place increased demands on security and privacy protection. Therefore, cryptographic mechanisms must be strong enough to m...

Full description

Saved in:
Bibliographic Details
Main Authors: Pyrkova, A.YU (Author), Temirbekova, ZH.E (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-11-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02654 am a22003013u 4500
001 ijeecs21550_14310
042 |a dc 
100 1 0 |a Pyrkova, A.YU.  |e author 
100 1 0 |e contributor 
700 1 0 |a Temirbekova, ZH.E.  |e author 
245 0 0 |a Compare encryption performance across devices to ensure the security of the IOT 
260 |b Institute of Advanced Engineering and Science,   |c 2020-11-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21550 
520 |a The internet of things (IoT) combines many devices with various platforms, computing capabilities and functions. The heterogeneity of the network and the ubiquity of IoT devices place increased demands on security and privacy protection. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, but at the same time they must be effective enough to be implemented on devices with disabilities. One of the limited devices are microcontrollers and smart cards. This paper presents the performance and memory limitations of modern cryptographic primitives and schemes on various types of devices that can be used in IoT. In this article, we provide a detailed assessment of the performance of the most commonly used cryptographic algorithms on devices with disabilities that often appear on IoT networks. We relied on the most popular open source microcontroller development platform, on the mbed platform. To provide a data protection function, we use cryptography asymmetric fully homomorphic encryption in the binary ring and symmetric cryptography AES 128 bit. In addition, we compared run-time encryption and decryption on a personal computer (PC) with Windows 7, the bluetooth low energy (BLE) Nano Kit microcontroller, the BLE Nano 1.5, and the smartcard ML3-36k-R1. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690 |a Computer science 
690 |a Internet of things; Microcontroller; BLE nano kit; Mbed platform; AES cryptography; Homomorphic encryption; BadUSB; ATmega32u4; Vulnerability 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 20, No 2: November 2020; 894-902 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v20.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21550/14310 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21550/14310  |z Get fulltext