A Comparative Evaluation of Symmetric Encryption Algorithms for Resource-Constrained Devices

  • Mayksuel Ramalho UFF
  • Gabriel S. de Oliveira UFF
  • Nicholas Neves UFF
  • Rafael Porto UFF
  • Victor Afonso M. Sobral UFF
  • Marcos Rezende Prefeitura Municipal de Niterói
  • Dianne S. V. Medeiros UFF

Abstract


Data security in the Internet of Things is crucial for protecting both devices and the data they transmit over the network. Nevertheless, security is often overlooked in this context, leaving systems vulnerable to cyber attacks that can compromise information confidentiality and integrity. This work focuses on a use case of a remote environmental variable monitoring system for disaster prevention, in which information must be confidential and intact. The AES (Advanced Encryption Standard) and Speck cryptographic algorithm families are evaluated in both traditional and memory-optimized implementations, targeting data confidentiality. The algorithms are assessed through practical experiments on a resource-constrained hardware platform. Transmission throughput, estimated energy consumption, execution time, and memory usage are evaluated. Results show that the Speck family executes more quickly, has lower estimated energy consumption, and occupies less memory space.

References

Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16(1):11.

Albarello, R., Oyamada, M. e de Camargo, E. (2020). Avaliação de algoritmos de criptografia e implementação de um protocolo leve para comunicação entre dispositivos iot. Em Anais Estendidos do X Simpósio Brasileiro de Engenharia de Sistemas Computacionais, p. 65–72, Porto Alegre, RS, Brasil. SBC.

Alvalá, R. C. S. e Barbieri, A. F. (2017). Desastres naturais. Em Mudanças climáticas em rede: um olhar interdisciplinar, volume 1, p. 203–230. Canal6Editora.

Beg, A., Al-Kharobi, T. e Al-Nasser, A. (2019). Performance evaluation and review of lightweight cryptography in an internet-of-things environment. Em 2nd International Conference on Computer Applications & Information Security (ICCAIS), p. 1–6.

Bogdanov, A., Khovratovich, D. e Rechberger, C. (2011). Biclique cryptanalysis of the full AES. Em Lee, D. H. e Wang, X., editors, Advances in Cryptology – ASIACRYPT 2011, p. 344–371, Berlin, Heidelberg. Springer Berlin Heidelberg.

de Paiva, B. D., de Souza, B. P. e Travassos, G. H. (2023). Cryptocomponent: um componente de criptografia para sistemas de software IoT de baixo custo. Em Anais Estendidos do XIV Congresso Brasileiro de Software: Teoria e Prática, p. 90–99. SBC.

El-hajj, M., Mousawi, H. e Fadlallah, A. (2023). Analysis of lightweight cryptographic algorithms on IoT hardware platform. Future Internet, 15(2).

Fotovvat, A., Rahman, G. M. E., Vedaei, S. S. e Wahid, K. A. (2021). Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes. IEEE Internet of Things Journal, 8(10):8279–8290.

Guinelli, J. V., Aguiar, O. V. e Lazarin, N. M. (2018). Análise e comparação de algoritmos criptográficos simétricos embarcados na plataforma arduino. Em Anais Estendidos do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, p. 167–176, Porto Alegre, RS, Brasil. SBC.

Hoffmann, R. B. e Griebler, D. (2023). Avaliando paralelismo em dispositivos com recursos limitados. Em Anais da XXIII Escola Regional de Alto Desempenho da Região Sul, p. 105–106. SBC.

Hossein Motlagh, N., Mohammadrezaei, M., Hunt, J. e Zakeri, B. (2020). Internet of things (iot) and the energy sector. Energies, 13(2).

Mouha, R. A. e Ait, R. (2021). Internet of things (IoT). Journal of Data Analysis and Information Processing, 09(2):77–101.

Panahi, P., Bayılmış, C., undefinedavuşoğlu, U. e Kaçar, S. (2021). Performance evaluation of lightweight encryption algorithms for IoT-based applications. Arabian Journal for Science and Engineering, 46(4):4015–4037.

Pereira, G. C. C. F., Alves, R. C. A., Silva, F. L. d., Azevedo, R. M., Albertini, B. C. e Margi, C. B. (2017). Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Security and Communication Networks, 2017:1–16.

Smith, R., Palin, D., Ioulianou, P. P., Vassilakis, V. G. e Shahandashti, S. F. (2020). Battery draining attacks against edge computing nodes in IoT networks. Cyber-Physical Systems, 6(2):96–116.

Song, L., Huang, Z. e Yang, Q. (2016). Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. Em Liu, J. K. e Steinfeld, R., editors, Information Security and Privacy, p. 379–394, Cham. Springer International Publishing.

Tawalbeh, L., Muheidat, F., Tawalbeh, M. e Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences, 10(12).

Vaz, Y., Mattos, J. e Soares, R. (2023). AES otimizado para uso em aplicações IoT. Em Anais Estendidos do XIII Simpósio Brasileiro de Engenharia de Sistemas Computacionais, p. 31–36, Porto Alegre, RS, Brasil. SBC.

Zanon, V., Romancini, E. M., Manoel, B., Lau, J., Ourique, F. e Morales, A. (2022). Avaliação experimental de uma camada de segurança implementada em dispositivo vestível cardíaco para internet das coisas médicas. Em Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, p. 97–110, Porto Alegre, RS, Brasil. SBC.
Published
2024-07-21
RAMALHO, Mayksuel; OLIVEIRA, Gabriel S. de; NEVES, Nicholas; PORTO, Rafael; SOBRAL, Victor Afonso M.; REZENDE, Marcos; MEDEIROS, Dianne S. V.. A Comparative Evaluation of Symmetric Encryption Algorithms for Resource-Constrained Devices. In: WORKSHOP ON PERFORMANCE OF COMPUTER AND COMMUNICATION SYSTEMS (WPERFORMANCE), 23. , 2024, Brasília/DF. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2024 . p. 49-60. ISSN 2595-6167. DOI: https://doi.org/10.5753/wperformance.2024.2530.