Simple Lightweight Cryptographic Algorithm to Secure Imbedded IoT Devices
نویسندگان
چکیده
The internet of things (IoT) revolution has been sparked by the exponential increase in connected devices caused recent advances wireless technology. These embedded gather, analyze, and send vast data via network. Data transmission security is a primary problem IoT networks. Several lightweight encryption/decryption algorithms have developed for such resource-constraint devices. One most effective fast encryption applications Tiny Encryption Algorithm (TEA). TEA few lines source codes to implement based on Feistel structure provide cryptographic primitive confusion diffusion features order hide statistical aspects plaintext. However, it vulnerable assaults using equivalent related key attacks. This study suggested modifying employing new proposed generating keys function two Linear Feedback Shift Registers (LFSRs) as combination address flaw utilizing different each round function. sensitivity, Avalanche effect, completeness test were used evaluate its performance. sensitivity modified outperforms original 50.18 % 44.88 %. avalanche effect 52.57 47.69 %, 51.75 48.36 Experimental results indicates that, performance better than TEA.
منابع مشابه
Secure Cryptographic Algorithm Implementation on Embedded Platforms
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. Generally these cryptosystems have been subject to rigorous mathematical analysis in an effort to uncover cryptographic weaknesses in the system. The cryptosystems used in smart cards are, therefore, not usually vulnerable to these types of attacks. Since smart cards are small objects that can be ...
متن کاملVLSI Design of Secure Cryptographic Algorithm
Light weight cryptography (LWC) is an emerging research area which has to deal with the trade-off among security, cost, and performance. In this paper we present the idea and list some types of LWC algorithms. Hummingbird is a novel ultra lightweight cryptographic algorithm targeted for resource constrained devices like RFID tags, smart cards and wireless sensor nodes. The hybrid model of Hummi...
متن کاملLightweight Symmetric Encryption Algorithm for Secure Database
Virtually all of today’s organizations store their data in huge databases to retrieve, manipulate and share them in an efficient way. Due to the popularity of databases for storing important and critical data, they are becoming subject to an overwhelming range of threats, such as unauthorized access. Such a threat can result in severe financial or privacy problems, as well as other corruptions....
متن کاملOptimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices
The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be appl...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of interactive mobile technologies
سال: 2022
ISSN: ['1865-7923']
DOI: https://doi.org/10.3991/ijim.v16i20.34505