Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Efficient Security Algorithm for Power Constrained IoT Devices

Mamvong, JN, Goteng, GL, Zhou, B and Gao, Y (2020) Efficient Security Algorithm for Power Constrained IoT Devices. IEEE Internet of Things Journal, 8 (7). pp. 5498-5509. ISSN 2327-4662

[img]
Preview
Text
Efficient Security Algorithm for Power Constrained IoT Devices.pdf - Accepted Version

Download (581kB) | Preview

Abstract

Internet of Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques, due to their constrained nature. Classical security algorithms which are built on complex cryptographic functions often require a level of processing that low power IoT devices are incapable to effectively achieve due to limited power and processing resources. Consequently, the option for constrained IoT devices lies in either developing new security schemes or modifying existing ones to be more suitable for constrained IoT devices. In this work, an Efficient security Algorithm for Constrained IoT devices; based on the Advanced Encryption Standard is proposed. We present a cryptanalytic overview of the consequence of complexity reduction together with a supporting mathematical justification, and provisioned a secure element (ATECC608A) as a trade-off. The ATECC608A doubles for authentication and guarding against implementation attacks on the associated IoT device (ARM Cortex M4 microprocessor) in line with our analysis. The software implementation of the efficient algorithm for constrained IoT devices shows up to 35% reduction in the time it takes to complete the encryption of a single block (16bytes) of plain text, in comparison to the currently used standard AES-128 algorithm, and in comparison to current results in literature at 26.6%

Item Type: Article
Additional Information: © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: 0805 Distributed Computing, 1005 Communications Technologies
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: IEEE
Date Deposited: 16 Oct 2020 11:34
Last Modified: 22 Aug 2022 14:15
DOI or ID number: 10.1109/JIOT.2020.3033435
URI: https://researchonline.ljmu.ac.uk/id/eprint/13843
View Item View Item