Evaluation of light cryptography algorithms on low-cost IoT devices
DOI:
https://doi.org/10.59282/reincisol.V3(6)2935-2961Keywords:
cryptography, IoT devices, Internet of Things (IoT), Low-cost devices, IoT Security.Abstract
The present study focuses on the application of lightweight cryptography techniques in low-cost IoT devices. With the exponential growth of Internet-connected devices, it is important to maintain the security and privacy of data transmitted and stored. However, these low-cost systems often have limitations in terms of computational resources, making it difficult to implement conventional cryptographic algorithms. In this work we proposed to evaluate lightweight cryptography algorithms integrated into a low-cost IoT device. These algorithms are characterized by requiring fewer computational resources, which makes them more appropriate for low-cost devices. Therefore, a comparative analysis of three lightweight cryptography algorithms was carried out, with a focus on security, performance and efficiency on resource-constrained IoT devices. In addition, aspects such as the number of encryptions and decryptions per minute, energy consumption and resistance to attacks to break encryption were evaluated. On the other hand, simulations were carried out to verify the security and performance of the system, and the results were compared with those obtained in two conventional cryptographic algorithms. The results of the study demonstrate that lightweight cryptography is a viable solution for low-cost IoT devices, as it offers an appropriate balance between security and efficiency in terms of computational resources. These algorithms allow you to protect the information transmitted and stored in IoT devices, without compromising performance or quickly exhausting limited resources.
Downloads
Metrics
References
Abujoodeh, M., Tamimi, L., & Tahboub, R. (2023). Toward Lightweight Cryptography: A Survey. Computational Semantics. doi:10.5772/intechopen.109334
Alves, F. (2023). Es esencial ir un paso por delante de las ciberamenazas - Evaluación de las vulnerabilidades. Obtenido de https://www.linkedin.com/pulse/evaluaci%C3%B3n-de-la-vulnerabilidades-base4-security/?originalSubdomain=es
AppMaster. (2023). Métricas empresariales para tomar decisiones informadas. (AppMaster) Obtenido de https://appmaster.io/es/blog/cracking-business-metrics-informed-decisions-es
Campos, M. (2015). Monitorización de respuestas físicas y fisiológicas al entrenamiento y la competición en fútbol. Sevilla: Universidad Pablo de Olavide.
Centro Criptológico Nacional. (2023). Guía de Mecanismos criptográficos autorizados por el CNN. Madrid: Ministerio de defensa España.
Coronel, C. (2018). Comparación del rendimiento y nivel de seguridad en algorítmos criptográficos ligeros PRESENT, CLEFIA, KECCAK y HIGHT: Una revisión sistemática. Samborondón: Universidad Espíritu Santo.
De la Parra, R. (2020). Seguridad en redes inalámbricas de área corporal mediante criptografía ligera. Tamaulipas: Centro de Investigación y de Estudios Avanzados del IPN.
Delgado, M. (2022). Curvas elípticas en la criptografía. Madrid: Universidad Politécnica de Madrid.
Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight Cryptography: A Solution to Secure IoT. Wireless Pers Commun(112), 1947–1980. doi:https://doi.org/10.1007/s11277-020-07134-3
Eterovic, J., & Cipriano, M. (2018). Stream Ciphers Livianos estandarizados mediante normas internacionales para ser usados en Internet de las Cosas. SISTEMAS, CIBERNÉTICA E INFORMÁTICA, XV(2), 29 - 33.
Fernández, C. (2007). Análisis comparativo a nivel teórico práctico de los algoritmos criptográficos orientado hacia la solución del problema de seguridad del transporte de documentos. Cuaca: Universidad del Cuaca.
Frąckiewiczen, M. (2023). La relación entre la salud digital y el Internet de las cosas (IoT). (TS2) Obtenido de https://ts2.space/es/la-relacion-entre-la-salud-digital-y-el-internet-de-las-cosas-iot/
Gálvez, H. (2014). Análisis de algoritmos criptográficos en una red híbrida P2P. Concepción: Universidad del Bio-Bio.
Garg, A., Gupta, P., & Bhullar, P. (2021). Is CSR Expenditure Relevant to the Firms in India? Organizations and Markets in Emerging Economies, XII(1), 178-197.
Gleimer, L. (2023). ¿Qué Es La Criptografía? Obtenido de https://www.linkedin.com/pulse/criptograf%C3%ADa-luis-gleimer-lambra%C3%B1o/?originalSubdomain=es
Hoy Digital. (2023). El poder y los desafíos de los dispositivos conectados. (Hoy Digital) Obtenido de https://hoy.com.do/el-poder-y-los-desafios-de-los-dispositivos-conectados/
IEEE Standards Association. (22 de Abril de 2016). 802.15.4-2015 - IEEE Standard for Low-Rate Wireless Networks. (IEEE) doi:10.1109/IEEESTD.2016.7460875
Kahn, D. (1967). The Codebreakers: The story of secret writing. New York: Macmillan.
Kariuki, C. (2023). Encriptación simétrica explicada en 5 minutos o menos. (GEEKFLARE) Obtenido de https://geekflare.com/es/symmetric-encryption/
Kim, J., Sung, H., Kim, J., & Kim, M. (2019). Lightweight cryptography for Internet of Things: A survey. Electronics, VIII(10), 1035. doi:10.1016/j.electronics.2019.10.1035
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ever Alejandro Palacios Acosta, Lechón Anzules Vicky Gabriel
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.