Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices.

Sensors (Basel)

Department of Computer Science and Engineering, PES University, Bengaluru 560085, India.

Published: June 2024

The IoT has become an integral part of the technological ecosystem that we all depend on. The increase in the number of IoT devices has also brought with it security concerns. Lightweight cryptography (LWC) has evolved to be a promising solution to improve the privacy and confidentiality aspect of IoT devices. The challenge is to choose the right algorithm from a plethora of choices. This work aims to compare three different LWC algorithms: AES-128, SPECK, and ASCON. The comparison is made by measuring various criteria such as execution time, memory utilization, latency, throughput, and security robustness of the algorithms in IoT boards with constrained computational capabilities and power. These metrics are crucial to determine the suitability and help in making informed decisions on choosing the right cryptographic algorithms to strike a balance between security and performance. Through the evaluation it is observed that SPECK exhibits better performance in resource-constrained IoT devices.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11207458PMC
http://dx.doi.org/10.3390/s24124008DOI Listing

Publication Analysis

Top Keywords

iot devices
16
cryptographic algorithms
8
resource-constrained iot
8
iot
6
efficiency security
4
security evaluation
4
evaluation lightweight
4
lightweight cryptographic
4
algorithms
4
algorithms resource-constrained
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!