Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 2046735, 16 pages
https://doi.org/10.1155/2017/2046735
Research Article

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Escola Politécnica, Universidade de São Paulo, São Paulo, SP, Brazil

Correspondence should be addressed to Geovandro C. C. F. Pereira; rb.psu.cral@ordnavoeg

Received 1 May 2017; Accepted 17 July 2017; Published 23 August 2017

Academic Editor: Qing Yang

Copyright © 2017 Geovandro C. C. F. Pereira et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Hu and N. K. Sharma, “Security considerations in ad hoc sensor networks,” Ad Hoc Networks, vol. 3, no. 1, pp. 69–89, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Lee, K. Kapitanova, and S. H. Son, “The price of security in wireless sensor networks,” Computer Networks, vol. 54, no. 17, pp. 2967–2978, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. C. B. Margi, R. C. A. Alves, and J. Sepulveda, “Sensing as a service: secure wireless sensor network infrastructure sharing for the internet of things,” in Proceedings of theProceedings of the International Workshop on Very Large Internet of Things (VLIoT 2017) in conjunction with the VLDB 2017, vol. 3, Munich, Germany, 2017, https://www.ronpub.com/OJIOT_2017v3i1n08_Margi.pdf.
  4. S. Hu, X. Zhang, H. Yao, and C. She, “An Android Terminal in TelosB Wireless Sensor Networks,” in Proceedings of the 2nd International Conference on Computer and Information Applications (ICCIA '12), December 2012. View at Publisher · View at Google Scholar
  5. Y. W. Law, J. Doumen, and P. Hartel, “Survey and benchmark of block ciphers for wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65–93, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. W. Su and M. Alzaghal, “Channel propagation characteristics of wireless MICAz sensor nodes,” Ad Hoc Networks, vol. 7, no. 6, pp. 1183–1193, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. H. J. Ban, J. Choi, and N. Kang, “Fine-grained support of security services for resource constrained internet of things,” International Journal of Distributed Sensor Networks, vol. 2016, Article ID 7824686, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Casado and P. Tsigas, “ContikiSec: a secure network layer for wireless sensor networks under the Contiki operating system,” in Identity and Privacy in the Internet Age, vol. 5838 of Lecture Notes in Computer Science, pp. 133–147, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  9. A. Dunkels, “Contiki 3.0 released, new hardware from texas instruments, zolertia,” The Official Contiki OS Blog, 2015, http://contiki-os.blogspot.ca/2015/08/contiki-30-released-new-hardware-from.html.
  10. SUPERCOP, “Mirror of SUPERCOP: System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives,” 2015, https://github.com/floodyberry/supercop.
  11. I. Corporation, “Intel edison product brief,” 2015, http://download.intel.com/support/edison/sb/edison_pb_331179001.pdf.
  12. O. Hyncica, P. Kucera, P. Honzik, and P. Fiedler, “Performance evaluation of symmetric cryptography in embedded systems,” in Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS'2011, pp. 277–282, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. Electronic codebook (ecb), 2016, https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_.28ECB.29.
  14. M. A. Simplicio Jr., B. T. De Oliveira, C. B. Margi, P. S. L. M. Barreto, T. C. M. B. Carvalho, and M. Näslund, “Survey and comparison of message authentication solutions on wireless sensor networks,” Ad Hoc Networks, vol. 11, no. 3, pp. 1221–1236, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, November 2004. View at Scopus
  16. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “MiniSec: a secure sensor network communication architecture,” in Proceedings of the 2007 6th International Symposium on Information Processing in Sensor Networks, pp. 479–488, New York, NY, USA, April 2007. View at Publisher · View at Google Scholar
  17. J. Hill, R. Szewczyk, W. Alec, S. Hollar, D. Culler, and K. Pister, “System architecture directions for networked sensors,” ACM SIGPLAN Notices, vol. 35, no. 11, pp. 93–104, 2000. View at Publisher · View at Google Scholar
  18. P. Serrano, A. Garcia-Saavedra, G. Bianchi, A. Banchs, and A. Azcorra, “Per-frame energy consumption in 802.11 devices and its implication on modeling and design,” IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1243–1256, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Kaup, P. Gottschling, and D. Hausheer, “PowerPi: measuring and modeling the power consumption of the raspberry Pi,” in Proceedings of the 39th Annual IEEE Conference on Local Computer Networks, (LCN '14), pp. 236–243, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. G. De Meulenaer, F. Gosset, F. Standaert, and O. Pereira, “On the energy cost of communication and cryptography in wireless sensor networks,” in Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob '08), pp. 580–585, Avignon, France, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. “Embedded linux board comparison,” 2014, https://learn.adafruit.com/embedded-linux-board-comparison/power-usage.
  22. “Measured power consumption of intel edison,” 2016, https://www.scivision.co/measured-power-consumption-of-intel-edison/.
  23. TinyOS, 2015, http://www.tinyos.net/.
  24. P. Levis, S. Madden, J. Polastre et al., “TinyOS: an operating system for sensor networks,” in Ambient Intelligence, pp. 115–148, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  25. A. Dunkels, B. Grönvall, and T. Voigt, “Contiki—a lightweight and flexible operating system for tiny networked sensors,” in Proceedings of the 29th IEEE Annual International Conference on Local Computer Networks (LCN '04), pp. 455–462, November 2004. View at Publisher · View at Google Scholar · View at Scopus
  26. N. Kushalnagar, G. Montenegro, and C. Schumacher, “IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals,” RFC 4919 4919, IETF, 2007, http://www.ietf.org/rfc/rfc4919.txt. View at Publisher · View at Google Scholar
  27. T. Winter, P. Thubert, A. Brandt et al., “RPL: IPv6 routing protocol for low-power and lossy networks,” RFC 6550 6550, 2012, http://www.ietf.org/rfc/rfc6550.txt. View at Publisher · View at Google Scholar
  28. C. Bormann, A. P. Castellani, and Z. Shelby, “CoAP: an application protocol for billions of tiny internet nodes,” IEEE Internet Computing, vol. 16, no. 2, pp. 62–67, 2012. View at Publisher · View at Google Scholar
  29. A. Dunkels, O. Schmidt, and T. Voigt, “Using protothreads for sensor node programming in,” in In Proceedings of the REALWSN 2005 Workshop on RealWorld Wireless Sensor Networks, 2005.
  30. The yocto project, 2015, https://www.yoctoproject.org/.
  31. N. F. Standard, “Announcing the advanced encryption standard (AES),” Federal Information Processing Standards Publication 197 NIST FIPS 197, 2001. View at Publisher · View at Google Scholar
  32. P. Barreto and M. Simplicio, “Curupira, a block cipher for constrained platforms, in: Anais do 25o Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos - SBRC’07, 2007”.
  33. S. Panasenko and S. Smagin, “Lightweight cryptography: underlying principles and approaches,” International Journal of Computer Theory and Engineering, pp. 516–520, 2011. View at Publisher · View at Google Scholar
  34. M. Simplicio, P. Barreto, T. Carvalho, C. Margi, and M. Naslund, “The Curupira-2 block cipher for constrained platforms: Specification and benchmarking,” in Proceedings of the 1st International Workshop on Privacy in Location-Based Applications - 13th European Symposium on Research in Computer Security (ESORICS '08), vol. 397, 2008, http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-397.
  35. C. De Cannière and B. Preneel, “Trivium,” in New Stream Cipher Designs, vol. 4986 of Lecture Notes in Computer Science, pp. 244–266, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  36. M. Hell, T. Johansson, and W. Meier, “Grain: a stream cipher for constrained environments,” International Journal of Wireless and Mobile Computing, vol. 2, no. 1, pp. 86–93, 2007. View at Publisher · View at Google Scholar · View at Scopus
  37. J. P. Aumasson, S. Neves, Z. Wilcox-OΓHearn, and C. Winnerlein, “BLAKE2: simpler, smaller, fast as MD5,” Applied Cryptography and Network Security, pp. 119–135, 2013. View at Google Scholar
  38. NIST, “Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family,” Tech. Rep., Department of Commerce, 2007, http://csrc.nist.gov/groups/ST/hash/documents/FR_Notice_Nov07.pdf. View at Google Scholar
  39. “gvanas, Keccak code package,” 2014, https://github.com/gvanas/KeccakCodePackage.
  40. P. FIPS, “The Keyed-Hash Message Authentication Code (HMAC),” FIPS PUB 198-1 NIST FIPS 198-1, National Institute of Standards and Technology, 2008. View at Publisher · View at Google Scholar
  41. M. A. Simplicio, B. Pedro Aquino, P. S. L. M. Barreto, T. C. M. B. Carvalho, and C. B. Margi, “The Marvin message authentication code and the LetterSoup authenticated encryption scheme,” Security and Communication Networks, vol. 2, no. 2, pp. 165–180, 2009. View at Publisher · View at Google Scholar · View at Scopus
  42. H. Lipmaa, P. Rogaway, and D. Wagner, “CTR-mode encryption,” First NIST Workshop on Modes of Operation, Citeseer, 2000. View at Google Scholar
  43. M. Dworkin, “NIST Special Publication 800-38C: The CCM Mode for Authentication and Confidentiality,” US National Institute of Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C.pdf.
  44. P. Rogaway, M. Bellare, and R. S. Ferguson, “OCB: a block-cipher mode of operation for efficient authenticated encryption,” ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 3, pp. 365–403, 2003. View at Publisher · View at Google Scholar
  45. P. Rogaway, “OCB: Background,” 2015, http://web.cs.ucdavis.edu/rogaway/ocb/ocb-faq.htm.
  46. M. J. Dworkin, “Nist special publication 800-38b,” Recommendation for Block Cipher Modes of Operation: The cmac mode for authentication NIST SP 800-38b, 2016. View at Publisher · View at Google Scholar
  47. M. A. Simplicio Jr., B. T. De Oliveira, P. S. L. M. Barreto, C. B. Margi, T. C. M. B. Carvalho, and M. Naslund, “Comparison of authenticated-encryption schemes in wireless sensor networks,” in Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, (LCN '11), pp. 450–457, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  48. M. Simplicio, LetterSoup implementation, 2015, http://www.larc.usp.br/mjunior/files/algs/8%20bits/LetterSoup/LetterSoup.c.
  49. M. Simplicio, “AEAD implementations,” 2015, http://www.larc.usp.br/mjunior/files/algs/8%20bits/algs8bits.zip.
  50. M. Simplicio, “Curupira-2 implementation,” 2015, http://www.larc.usp.br/mjunior/files/algs/8%20bits/Curupira-2/Curupira-2.zip.
  51. G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, CAESAR submission: Ketje v1, 2014, http://competitions.cr.yp.to/round1/ketjev11.pdf.
  52. S. Pelissier, “Application using trivium with 16-bit microcontroller,” 2009, https://github.com/tyll/tinyos-2.x-contrib/tree/master/crypto/apps.
  53. J.-P. Aumasson, S. Neves, Z. Wilcox-O'Hearn, and C. Winnerlein, “BLAKE2: simpler, smaller, fast as MD5,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7954, pp. 119–135, 2013. View at Publisher · View at Google Scholar · View at Scopus
  54. O. Gay, “HMAC implementation,” 2015, https://github.com/ogay/hmac.
  55. M. Simplicio, Marvin implementation, 2015, http://www.larc.usp.br/mjunior/files/algs/8%20bits/Marvin/Marvin.c.
  56. M. Bellare, P. Rogaway, and D. Wagner, “The EAX mode of operation,” in Fast Software Encryption: 11th International Workshop (FSE 2004), B. Roy and W. Meier, Eds., pp. 389–407, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  57. T. Krovetz and P. Rogaway, “The OCB authenticated-encryption algorithm,” RFC Editor RFC7253, 2014, http://www.cs.ucdavis.edu/rogaway/papers/ocb-id.htm. View at Publisher · View at Google Scholar
  58. Agilent, “Agilent 34401A Multimeter,” 2007, http://cp.literature.agilent.com/litweb/pdf/5968-0162EN.pdf.
  59. L. P. Manual and gettimeofday., 2015, http://man7.org/linux/man-pages/man2/gettimeofday.2.html.
  60. C. B. Margi, B. T. De Oliveira, G. T. De Sousa et al., “Impact of operating systems on Wireless Sensor Networks (security) applications and testbeds,” in Proceedings of the 2010 19th International Conference on Computer Communications and Networks, (ICCCN '10), August 2010. View at Publisher · View at Google Scholar · View at Scopus