A Comparative Analysis of Cryptographic Algorithms in the Internet of Things

Ilya Makarenko, Sergey Semushin, Sabah Suhai, S. M. Ahsan Kazmi, Alma Oracevic, Rasheed Hussain

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Abstract

Wireless Sensor Network (WSN) technology is an integral part of Internet of Things (IoT) and the security of IoT will play a pivotal role in its deployment and commercialization. To secure communication in WSN, selecting appropriate encryption algorithm is essentially important because IoT devices are inherently low-powered and have limited resources. In this regard, in this paper, we compare diverse symmetric block-based cryptographic algorithms to comment on their capabilities that will aid in selecting the right algorithm for a specific application. We select widely used algorithms such as AES, CLEFIA, DES, Triple DES, IDEA, PRESENT, SEA, SPECK, TEA, XTEA and TWOFISH with different block and key lengths. The algorithms are compared from the perspective of energy, power and memory consumption, and throughput. The comparison is performed in Cooja simulator using z1 motes and the source code is published in the GitHub repository.

Original languageEnglish
Title of host publication3rd International Science and Technology Conference "Modern Network Technologies 2020", MoNeTeC 2020 - Proceedings
EditorsRuslan Smeliansky
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Electronic)9781728182681
DOIs
Publication statusPublished - 27 Oct 2020
Event3rd International Science and Technology Conference "Modern Network Technologies 2020", MoNeTeC 2020 - Moscow, Russian Federation
Duration: 27 Oct 202029 Oct 2020

Publication series

Name3rd International Science and Technology Conference "Modern Network Technologies 2020", MoNeTeC 2020 - Proceedings

Conference

Conference3rd International Science and Technology Conference "Modern Network Technologies 2020", MoNeTeC 2020
Country/TerritoryRussian Federation
CityMoscow
Period27/10/2029/10/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • comparative analysis
  • cryptographic algorithms
  • encryption algorithms
  • Internet of Things
  • IoT security

Fingerprint

Dive into the research topics of 'A Comparative Analysis of Cryptographic Algorithms in the Internet of Things'. Together they form a unique fingerprint.

Cite this