Skip to main content

Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms

  • Conference paper
  • First Online:
Book cover Multimedia Communications, Services and Security (MCSS 2020)

Abstract

In the last few years, there have been more and more security vulnerabilities in IoT devices. Some authors suggest the use of security algorithms and methods used on computers for protection, but in this paper, we propose that some hash encryption algorithms can be used in IoT application to provide integrity and authenticity of a message. It can be used when the risk of data misuse and the need for strong protection are low.

Five different development boards are tested to prove that the proposed HMAC algorithm is not too computing-intensive. mbedTLS library has been used, and performance (speed) of boards have been measured with different secret key and payload size. We concluded that SHA256 and HMAC-SHA256 algorithms could be taken into account when deciding on the application of cryptography, primarily due to the ease of use and a low load of the microcontroller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashton, K., et al.: That ‘internet of things’ thing. RFID J. 22, 97–114 (2009)

    Google Scholar 

  2. Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 October 2016. https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet. Accessed 16 May 2020

  3. Zimmerli, L., Schläpfer, T., Rüst, A.: Securing the IoT: introducing an evaluation platform for secure elements. In: Konferenz Internet of Things-vom Sensor bis zur Cloud, Stuttgart, Deutschland, 20. November 2019 (2019)

    Google Scholar 

  4. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  5. Vongsingthong, S., Smanchat, S.: Internet of things: a review of applications and technologies. Suranaree J. Sci. Technol. 21, 359–374 (2014)

    Google Scholar 

  6. Yang, Q., Wang, Z., Yue, Y.: Summarize the technology of the things of Internet. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet) (2012)

    Google Scholar 

  7. Arduino: Software, Arduino. https://www.arduino.cc/en/main/software. Accessed 22 May 2020

  8. Trusted Firmware: https://www.trustedfirmware.org/. Accessed 23 May 2020

  9. Columbus, L.: Iot market predicted to double by 2021, reaching $520b, Forbes, 16 August 2018. https://www.forbes.com/sites/louiscolumbus/2018/08/16/. Accessed 23 May 2020

  10. Gillett, F.: Predictions 2020: IoT Expansion Brings Even More Change,” Forrester, 1 November 2019. https://go.forrester.com/blogs/predictions-2020-iot/. Accessed 15 May 2020

  11. Bastos, D.: Cloud for IoT-a Survey of Technologies and Security features of Public Cloud IoT solutions (2019)

    Google Scholar 

  12. Bastos, D., Shackleton, M., El-Moussa, F.: Internet of Things: a survey of technologies and security risks in smart home and city environments (2018)

    Google Scholar 

  13. El Jaouhari, S., Bouabdallah, A., Bonnin, J.-M., Lemlouma, T.: Securing the communications in a wot/webrtc-based smart healthcare architecture. In: 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC) (2017)

    Google Scholar 

  14. Pearson, B., Luo, L., Zhang, Y., Dey, R., Ling, Z., Bassiouni, M., Fu, X.: On misconception of hardware and cost in IoT security and privacy. In: ICC 2019-2019 IEEE International Conference on Communications (ICC) (2019)

    Google Scholar 

  15. Li, Y.: An integrated platform for the internet of things based on an open source ecosystem. Fut. Internet 10, 105 (2018)

    Article  Google Scholar 

  16. Zhang, E.P., Fang, J., Li, D.C.C., Ching, M.W.H., Chim, T.W., Hui, L.C.K., Yiu, S.M.: A simple and efficient way to combine microcontrollers with RSA cryptography. Comput. Sci. (LNECS) 2207, 7–11 (2013)

    Google Scholar 

  17. Thingsturn: Thingsturn.com, Thingsturn. https://www.thingsturn.com/. Accessed 21 May 2020

  18. STMicroelectronics: NUCLEO-L476RG - STM32 Nucleo-64 development board with STM32L476RG MCU, supports Arduino and ST morpho connectivity, STMicroelectronics. https://www.st.com/en/evaluation-tools/nucleo-l476rg.html. Accessed 23 May 2020

  19. Espressif: ESP32 Series Datasheet (2020). https://www.espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdf. Accessed 14 May 2020

  20. Seeed: Sipeed MAix BiT for RISC-V AI + IoT. https://www.seeedstudio.com/Sipeed-MAix-BiT-for-RISC-V-AI-IoT-p-2872.html. Accessed 12 May 2020

  21. Embedded Microprocessor Benchmark Consortium: About EEMBC, Embedded Microprocessor Benchmark Consortium (2020). https://www.eembc.org/about/. Accessed 15 July 2020

  22. Berkeley Design Technology, Inc.: Overview of BDTI Services, Berkeley Design Technology, Inc. (2020). https://www.bdti.com/company/overview-of-bdti-services. Accessed 15 July 2020

  23. Nakutis, Ž.: Embedded microcontrollers benchmarking using sliding window algorithm. Elektronika ir Elektrotechnika 75, 49–52 (2007)

    Google Scholar 

  24. Kumar, U., Borgohain, T., Sanyal, S.: Comparative analysis of cryptography library in IoT. CoRR, vol. abs/1504.04306, 2015

    Google Scholar 

  25. Bakker, P.: PolarSSL is now a part of ARM, arm mbed, 24 November 2014. https://tls.mbed.org/tech-updates/blog/polarssl-part-of-arm. Accessed 25 May 2020

  26. Penard, W., van Werkhoven, T.: On the secure hash algorithm family. Cryptography in Context, pp. 1–18 (2008)

    Google Scholar 

  27. National Institute of Standards and Technology: Announcing Approval of Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard; a Revision of FIPS 180-1, 26 August 2002. https://www.federalregister.gov/documents/2002/08/26/02-21599/announcing-approval-of-federal-information-processing-standard-fips-180-2-secure-hash-standard-a. Accessed 24 May 2020

  28. IETF Secretariat: IPR Details, IETF Secretariat, 20 June 2007. https://datatracker.ietf.org/ipr/858/. Accessed 22 May 2020

  29. Glenn, L.M.: Device for and method of one-way cryptographic hashing. United States of America Patent US6829355B2, 5 March 2001

    Google Scholar 

  30. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication (1996)

    Google Scholar 

  31. Turner, S., Chen, L.: Updated security considerations for the MD5 message-digest and the HMAC-MD5 algorithms (2011)

    Google Scholar 

  32. Gulley, S., Gopal, V., Yap, K., Feghali, W., Guilford, J., Wolrich, G.: Intel SHA Extensions, July 2013. https://software.intel.com/content/dam/develop/external/us/en/documents/intel-sha-extensions-white-paper-402097.pdf. Accessed 12 June 2020

  33. Larabel, M.: AMD starts linux enablement on next-gen “Zen” Architecture. Phoronix Media, 17 March 2015. https://www.phoronix.com/scan.php?page=news_item&px=AMD-Zen-CPU-Znver1. Accessed 1 June 2020

  34. ARM: ARM Cortex-A53 MPCore Processor (2014). http://infocenter.arm.com/help/topic/com.arm.doc.ddi0500e/DDI0500E_cortex_a53_r0p3_trm.pdf. Accessed 2 June 2020

  35. Durand, A., Gremaud, P., Pasquier, J., Gerber, U.: Trusted lightweight communication for IoT systems using hardware security. In: Proceedings of the 9th International Conference on the Internet of Things, New York, NY, USA (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristian Dokic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dokic, K., Mesic, T., Cobovic, M. (2020). Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms. In: Dziech, A., Mees, W., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2020. Communications in Computer and Information Science, vol 1284. Springer, Cham. https://doi.org/10.1007/978-3-030-59000-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59000-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58999-8

  • Online ISBN: 978-3-030-59000-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics