Efficient Security Algorithm for Power-Constrained IoT Devices
نویسندگان
چکیده
Internet-of-Things (IoT) devices characterized by low power and processing capabilities do not exactly fit into the provision of existing security techniques due to their constrained nature. Classical algorithms that are built on complex cryptographic functions often require a level low-power IoT incapable effectively achieve limited resources. Consequently, option for lies in either developing new schemes or modifying ones be more suitable devices. In this work, an efficient algorithm devices, based advanced encryption standard, is proposed. We present cryptanalytic overview consequence complexity reduction together with supporting mathematical justification, provisioned secure element (ATECC608A) as tradeoff. The ATECC608A doubles authentication guarding against implementation attacks associated device (ARM Cortex M4 micro-processor) line our analysis. software shows up 35% time it takes complete single block (16 B) plain text, comparison currently used standard AES-128 algorithm, current results literature at 26.6%.
منابع مشابه
A Distributed Security Mechanism for Resource-Constrained IoT Devices
Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...
متن کاملEnhanced Genetic Algorithm Approach for Security Constrained Optimal Power Flow Including FACTS Devices
This paper presents a genetic algorithm based approach for solving security constrained optimal power flow problem (SCOPF) including FACTS devices. The optimal location of FACTS devices are identified using an index called overload index and the optimal values are obtained using an enhanced genetic algorithm. The optimal allocation by the proposed method optimizes the investment, taking into ac...
متن کاملTest Programming for Power Constrained Devices
The conventional method of testing during wafer sort using an Automatic Test Equipment (ATE) is to provide fixed clock period to the circuit under test (CUT). This may lead to longer test times owing to large number of sequential elements in the design. Under such scenario, it is observed that the dynamic power dissipated during each test cycle varies based on the amount of signal transitions i...
متن کاملDemo Abstract: RocketLogger - Mobile Power Logger for Prototyping IoT Devices
We demonstrate the RocketLogger, a mobile data logger designed for prototyping energy harvesting IoT devices. Novel IoT applications require new dataloggers with a highly increased dynamic range for current measurement to accommodate both ultra-low sleep currents of few nanoamperes as well as wireless communication currents in the range of hundreds of milliamperes. In parallel to ultra-low curr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2021
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2020.3033435