Abstract
The Internet of Things (IoT) is undoubtedly a current topic for private and public sector. Nowadays, the communication technologies allow to connect even a simplest physical object often with very limited physical resources. The IoT cover among the others also many areas with sensitive data, where the limited devices are also used. The use of these limited devices keep the security issue as a difficult task. The symmetric ciphers are often considered as a best way to encrypt the communication in the limited devices. Despite the fact that there are many hardware optimized solutions, there are still areas where these solutions cannot be used i.e. due to the limiting price or power. This paper focus on a software optimization of the symmetric cipher on limited micro-controller. Two main implementation are introduced. Further, we provide experimental measurements and possible suggestions for time consumption and memory use reduction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Our described secure communication has been tested in an experimental network in CEZ Distribuce, a.s. (one of the biggest Czech power supplier). The MEg40+ Universal energy meter was installed in the power substation Noviny (Velky Grunov area, the Czech Republic). The Data Concentrator was located in Brno, the Czech Republic. The communication distance was approximately 240 km [14].
References
Masek, P., et al.: Implementation of true IoT vision: survey on enabling protocols and hands-on experience. Int. J. Distrib. Sens. Netw. (2016)
Ruggieri, M., Nikookar, H.: Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishess, Aalborg (2013). ISBN 978-87-92982-96-4
Palattella, M.R., et al.: Internet of things in the 5G Era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016). ISSN 0733–8716
Ometov, A., et al.: Feasibility characterization of cryptographic primitives for constrained (Wearable) IoT devices. In: IEEE International Conference on Pervasive Computing and Communications, pp. 1–6 (2016). ISBN 978-1-5090-1940-3
Crabtree, A., Mortier, R.: Personal Data, Privacy and the Internet of Things: The Shifting Locus of Agency and Control. SSRN, Elsevier (2016)
Levitt, T.: IoT Governance, Privacy and Security Issues. European Research Cluster on The Internet of Things. European Commission - Information Society and Media (2015)
Yadav, S.K., Relan, N., Bhatia, S.J.: On industrial needs of symmetric cryptography. Int. J. Theor. Appl. Sci. 2(1), 41–44 (2010). ISSN 0975–1718
Damien, G.: BlueKrypt v30.2. Cryptographic Key Length Recommendation (2017)
European Payments Council: Guidelines on Cryptographic Algorithms Usage and Key Management. EPC342-08 Version 6.0 (2016)
European Network and Information Security Agency: Algorithms, Key Sizes and Parameters Report: 2013 Recommendations. Version 1.0 (2013)
U.S. National Institute of Standards and Technology: Recommendatin for Key Management - Part 1: General (Revision 3). NIST Special Publication 800–57 Part 1 Revision 3 (2016)
U.S. National Institute of Standards and Technology: Announcing the Advanced Encryption Standard (AES). Federal Information - Processing Standards Publication 197, FIPS PUB 197 (2001)
Otero, C.T.O., Tse, J., Manohar, R.: AES hardware-software co-design in WSN. In: 21st IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC), pp. 85–92 (2015)
Mlynek, P., Misurec, J., Koutny, M., Raso, O.: Design of secure communication in network with limited resources. In: Proceedings of the 4th European Innovative Smart Grid Technologies (ISGT), pp. 1–5 (2013). ISBN 978-1-4799-2984-9
Mlynek, P., Misurec, J., Koutny, M., Silhavy, P.: Two-port network transfer function for power line topology modeling. Radioengineering 21(1), 356–363 (2012)
Fujdiak, R., et al.: Efficiency evaluation of different types of cryptography curves on low-power devices. In: Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 269–274 (2015). ISBN 978-1-4673-9283-9
Fujdiak, R., et al.: Random number generator in MSP430 x5xx families. Elektrorevue. 4(1), 70–74 (2013). ISSN 1213–1539
Fujdiak, R., Mlynek, P., Misurec, J., Raso, O.: Cryptography in ultra-low power Microcontroller MSP430. Int. J. Eng. Trends Technol. 6(8), 398–404 (2013). ISSN 2231–5381
Fujdiak, R., Misurec, J., Mlynek, P., Leonard, J.G.: Cryptograph key distribution with elliptic curve Diffie-Hellman algorithm in low-power devices for power grids. Rev. Roum. Sci. Tech. Serie Électrotechn. et Énerg. 61(1), 84–88 (2016). ISSN 0035–4066
Texas Instruments: Mixed Signal Microcontroller: MSP430F5438A-EP. Technical documentation SLAS967A (2014)
Mlynek, P., Koutny, M., Misurec, J., Raso, O.: Authentication and encryption DLL library, (Software). http://www.utko.feec.vutbr.cz/~mlynek/dll.html
Texas Instruments: Advanced Encryption Standard, (software). http://www.ti.com/tool/AES-128#descriptionArea
Fujdiak, R.: Measurement of symmetric cipher on low power devices for power grids. In: Proceedings of the 21st Conference STUDENT EEICT, pp. 556–560 (2015). ISBN: 978-80-214-5148- 3
Texas Instruments: MSP430 Optimizing C/C++ Compiler v16.12.0.STS. Technical documentation SLAU132N (2016)
Talha, S.U., et al.: Efficient advance encryption standard (AES) implementation on FPGA using Xilinx system generator. In: 6th IEEE International Conference on Intelligent and Advanced Systems (ICIAS), pp. 1–6 (2016)
Rao, M., Newe, T., Grout, I.: AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs. In: 9th IEEE International Conference on Sensing Technology (ICST), pp. 773–778 (2015)
Acknowledgement
Research described in this article was financed by the National Sustainability Program under grant LO1401and by the Technology Agency of Czech Republic project No. TA04021490. For the research, the infrastructure of the SIX Centre was used.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fujdiak, R., Mlynek, P., Misurec, J., Slacik, J. (2017). Software Optimization of Advanced Encryption Standard for Ultra-Low-Power MSP430. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-57141-6_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57140-9
Online ISBN: 978-3-319-57141-6
eBook Packages: EngineeringEngineering (R0)