skip to main content
10.1145/3360774.3368202acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobiquitousConference Proceedingsconference-collections
research-article

Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device

Published: 03 February 2020 Publication History

Abstract

With the proliferation of IoT, securing the abundance of devices is critical. The current IoT and security landscapes lack empirical evidence on algorithms optimized for constrained devices. In this paper, we study the performance of various symmetric encryption algorithms on a Contiki-based IoT device. This paper provides encryption and decryption durations and energy consumption results on three symmetric encryption algorithm implementations of AES (tinyAES, B-Con's AES, and Contiki's own built-in AES), where we found algorithms specifically built for constrained devices fared much better than those not, optimized algorithms using about 0.16 the energy and the time to perform encryption and decryption.

References

[1]
[2]
[n. d.]. CC2650. http://www.ti.com/product/CC2650
[3]
2018. https://github.com/contiki-os/contiki
[4]
Caroline Fontaine Jacques Fournier Benjamin Lac Maria Naya-Plasencia Renaud Sirdey et al. Anne Canteaut, Sergiu Carpov. 2017. End-to-end data security for IoT: from a cloud of encryptions to encryption in the cloud. In Cesar Conference 2017.
[5]
ARM 2016. ARM Compiler v5.06 for μVision armcc User Guide. ARM.
[6]
Doug Whiting David Wagner Chris Hall Bruce Schneier, John Kelsey. 1999. Performance Comparison of the AES Submissions.
[7]
Brad Conte. 2015. Basic implementations of standard cryptography algorithms, like AES and SHA-1. https://github.com/B-Con/crypto-algorithms.
[8]
Joan Daemen and Vincent Rijmen. 2002. The design of Rijndael: AES --- the Advanced Encryption Standard. Springer-Verlag. 238 pages.
[9]
A. Dunkels, B. Gronvall, and T. Voigt. 2004. Contiki - a lightweight and flexible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks. 455--462.
[10]
Morris J. Dworkin. 2001. SP 800-38A 2001 Edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. Technical Report. Gaithersburg, MD, United States.
[11]
John Gutekunst. 2019. Docks flooded as failed dam sensor causes water levels to rise near Parker. Retrieved September 28, 2019 from https://www.havasunews.com/news/docks-flooded-as-failed-dam-sensor-causes-water-levels-to/article_0b34d75b-335a-5a72-bf63-6ec44ffe7a60.html
[12]
P. Hamalainen, T. Alho, M. Hannikainen, and T. D. Hamalainen. 2006. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In 9th EUROMICRO Conference on Digital System Design (DSD'06). 577--583.
[13]
Abdalla Adam Abdalla Yousif Hassan. 2017. Evaluation of encryption algorithms for IOT security. Master's thesis. University of Almughtaribeen.
[14]
Mark Hung. 2017. Leading the IoT. Gartner. https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf
[15]
kokke. 2019. Small portable AES128/192/256 in C. https://github.com/kokke/tiny-AES-c.
[16]
Uli Kretzschmar. 2009. AES128 - A C Implementation for Encryption and Decryption. Texas Instruments.
[17]
Kristen Linsalata. 2017. Recall: Abbott Pacemakers for Hacking Threat. https://www.webmd.com/heart/news/20170905/recall-abbott-pacemakers-for-hacking-threat
[18]
Mentor [n. d.]. Sourcery CodeBench. Mentor.
[19]
Matej Mikulic. 2019. Global number of pacemakers in 2016 and a forecast for 2023 (in million units). Retrieved September 28, 2019 from https://www.statista.com/statistics/800794/pacemakers-market-volume-in-units-worldwide/
[20]
Mastooreh Salajegheh. 2013. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. Open Access Dissertations.
[21]
Bruce Schneier. 1994. Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption, Ross Anderson (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 191--204.
[22]
Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, and Eita Kobayashi. 2013. TWINE: A Lightweight Block Cipher for Multiple Platforms. In Selected Areas in Cryptography, Lars R. Knudsen and Huapeng Wu (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 339--354.
[23]
Okamura Toshihiko. 2017. Lightweight Cryptography Applicable to Various IoT Devices. NEC Technical Journal 12 (2017).
[24]
Mark N. Wegman and F. Kenneth Zadeck. 1991. Constant Propagation with Conditional Branches. ACM Trans. Program. Lang. Syst. 13, 2 (April 1991), 181--210.
[25]
Kai Zhao and Lina Ge. 2013. A Survey on the Internet of Things Security. In Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security (CIS '13). 663--667.

Cited By

View all
  • (2024)Digital Twin Integrity Protection in Distributed Control Systems2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454732(540-545)Online publication date: 6-Jan-2024
  • (2024)Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454706(152-158)Online publication date: 6-Jan-2024
  • (2024)An energy efficient encryption technique for the Internet of Things sensor nodesInternational Journal of Information Technology10.1007/s41870-024-01750-z16:4(2517-2533)Online publication date: 27-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
November 2019
545 pages
ISBN:9781450372831
DOI:10.1145/3360774
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 February 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. internet of things
  3. security
  4. sensor networks

Qualifiers

  • Research-article

Conference

MobiQuitous
MobiQuitous: Computing, Networking and Services
November 12 - 14, 2019
Texas, Houston, USA

Acceptance Rates

Overall Acceptance Rate 26 of 87 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Digital Twin Integrity Protection in Distributed Control Systems2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454732(540-545)Online publication date: 6-Jan-2024
  • (2024)Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454706(152-158)Online publication date: 6-Jan-2024
  • (2024)An energy efficient encryption technique for the Internet of Things sensor nodesInternational Journal of Information Technology10.1007/s41870-024-01750-z16:4(2517-2533)Online publication date: 27-Feb-2024
  • (2023)Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time CostsSensors10.3390/s2322917223:22(9172)Online publication date: 14-Nov-2023
  • (2022)Protocols for Secure Remote Access to Vehicle Onboard Diagnostic Systems in Smart CitiesIEEE Intelligent Transportation Systems Magazine10.1109/MITS.2022.318068814:5(209-221)Online publication date: Sep-2022
  • (2022)A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2021.30984969:5(3684-3703)Online publication date: 1-Mar-2022
  • (2022)Evaluating the cost of beyond AES-128 LoRaWAN security2022 International Symposium on Networks, Computers and Communications (ISNCC)10.1109/ISNCC55209.2022.9851811(1-6)Online publication date: 19-Jul-2022
  • (2021)A Performance Study of Crypto-Hardware in the Low-end IoTProceedings of the 2021 International Conference on Embedded Wireless Systems and Networks10.5555/3451271.3451279(79-90)Online publication date: 20-Feb-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media