Performance Evaluation of IoT Encryption Algorithms: Memory, Timing, and Energy

Sudip Maitra, Dylan Richards, Ahmed Abdelgawad, Kumar Yelamarthi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Security in the Internet of Things is a crucial aspect and a lot of studies are focused on modular and scalable encryption algorithms. Resource constraints at the edge nodes of an IoT system require lightweight encryption algorithms. A comparative study of AES with and without hardware accelerators and XTEA is performed to analyze the performance of the algorithms in terms of memory, power and execution time and assess the feasibility of using XTEA in low resource embedded platforms. Although the hardware accelerated AES was fastest (0.5 ms) and consequently required the least amount of energy (0.01 mJ) out of the three, the execution time (1.25 ms) and energy consumed (0.024 mJ) by XTEA was comparatively close and can be a feasible encryption algorithm for low resource microcontrollers that do not have the resources to support AES implementation in software or lack a hardware accelerator. Software implementation of AES on 8-bit PIC architecture required 7538 bytes whereas XTEA required only 1184 bytes of program memory, leaving enough space for application firmware.

Original languageEnglish
Title of host publicationSAS 2019 - 2019 IEEE Sensors Applications Symposium, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538677131
DOIs
StatePublished - May 3 2019
Event14th IEEE Sensors Applications Symposium, SAS 2019 - Sophia Antipolis, France
Duration: Mar 11 2019Mar 13 2019

Publication series

NameSAS 2019 - 2019 IEEE Sensors Applications Symposium, Conference Proceedings

Conference

Conference14th IEEE Sensors Applications Symposium, SAS 2019
Country/TerritoryFrance
CitySophia Antipolis
Period03/11/1903/13/19

Keywords

  • AES
  • IoT security
  • XTEA
  • block ciphers
  • lightweight
  • microcontroller
  • resource constraints

Fingerprint

Dive into the research topics of 'Performance Evaluation of IoT Encryption Algorithms: Memory, Timing, and Energy'. Together they form a unique fingerprint.

Cite this