Skip to main content

A Comparative Study of Data Encryption Techniques for Data Security in the IoT Device

  • Conference paper
  • First Online:
Internet of Things and Its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 825))

Abstract

The Internet of things (IoT) has been widely used around the world and the use of IoT applications has been increasing. Because of its accessibility with the existing communication and computing capacity, the IoT application domain has been widening. But, as it has been the issue of security and privacy in other communication-based application, the IoT device-based applications have also been under the threat of attacks. There have been risks of both physical damaging on the devices and digital cyber attacks. To apply the security on the digital IoT system, lightweight cryptography techniques have been used as an alternative to minimize any potential threats and hence make the system more secure. Over the years, different encryption algorithms such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, and many others have been implemented in different IoT applications. However, selecting the right algorithm has always been challenging. In this paper, a comparative analysis in terms of the encryption process and throughput has been analyzed for AES, DES, 3DES, and Blowfish algorithms. As an IoT application, Raspberry Pi 3B+ based system for sensing humidity and temperature has been designed for the experimental comparison among these algorithms. In the application, the sensor data has been transmitted to the server using different encryption algorithms having varying key lengths. The comparative analysis of the encryption process time and throughput has been analysed to evaluate the strength and weaknesses of each encryption algorithm in our IoT application. The experimental results have shown that DES and 3DES algorithm has the minimum time requirement for encryption whereas Blowfish has the highest throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Punia A, Gupta D, Jaiswal S (2017) A perspective on available security techniques in IoT. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), IEEE, pp 1553–1559

    Google Scholar 

  2. Goyal P, Batra S, Singh A (2010) A literature review of security attack in mobile ad-hoc networks. Int J Comput Appl 9:11–15

    Google Scholar 

  3. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. pp 648–651

    Google Scholar 

  4. Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for IoT devices. In: 2018 IEEE Long Island systems, applications and technology conference (LISAT), pp 1–8

    Google Scholar 

  5. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182–8201

    Article  Google Scholar 

  6. SuĂ¡rez-Albela M, FernĂ¡ndez-CaramĂ©s TM, Fraga-Lamas P, Castedo L (2018) A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: 2018 global internet of things summit (GIoTS), IEEE, pp 1–6

    Google Scholar 

  7. Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Commun Netw 4:118–137

    Article  Google Scholar 

  8. Mendez Mena D, Papapanagiotou I, Yang B (2018) Internet of things: survey on security. Inform Secur J: Global Perspect 27:162–182

    Google Scholar 

  9. Mohamad Noor Mb, Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294

    Google Scholar 

  10. Wen Q, Dong X, Zhang R (2012) Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems, IEEE, pp. 1062–1066

    Google Scholar 

  11. Thangavel R, Palanisamy B (2011) Efficient approach towards an agent-based dynamic web service discovery framework with QoS support. In: International symposium on computing, communication, and control (ISCCC), Citeseer, pp 74–78

    Google Scholar 

  12. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humanized Comput 1–18

    Google Scholar 

  13. Maitra S, Richards D, Abdelgawad A, Yelamarthi K (2019) Performance evaluation of IoT encryption algorithms: memory, timing, and energy. In: 2019 IEEE sensors applications symposium (SAS), pp 1–6

    Google Scholar 

  14. Zeebaree SR (2020) DES encryption and decryption algorithm implementation based on FPGA. Indones J Electr Eng Comput Sci 18:774–781

    Article  Google Scholar 

  15. Wang Z, Yao Y, Tong X, Luo Q, Chen X (2019) Dynamically reconfigurable encryption and decryption system design for the internet of things information security. Sensors 19:143

    Article  Google Scholar 

  16. Joshy A, Jalaja M (2017) Design and implementation of an IoT based secure biometric authentication system. In: 2017 IEEE international conference on signal processing, informatics, communication and energy systems (SPICES), IEEE, pp 1–13

    Google Scholar 

  17. Hussaini S (2020) Cyber security in cloud using blowfish encryption. Int J Inform Technol (IJIT) 6

    Google Scholar 

  18. Mohammed AF, Qyser AAM (2019) A hybrid approach for secure iris-based authentication in IoT. In: International conference on intelligent computing and communication technologies, Springer, pp 159–167

    Google Scholar 

  19. Bui D-H, Puschini D, Bacles-Min S, Beigné E, Tran X-T (2016) Ultra low-power and low-energy 32-bit datapath AES architecture for IoT applications. In: 2016 International conference on IC design and technology (ICICDT), IEEE, pp 1–4

    Google Scholar 

  20. Fahd S, Afzal M, Abbas H, Iqbal W, Waheed S (2018) Correlation power analysis of modes of encryption in AES and its countermeasures. Futur Gener Comput Syst 83:496–509

    Article  Google Scholar 

  21. Srinivasarao D (2011) Analyzing the superlative symmetric cryptographic encryption algorithm. J Global Res Comput Sci 2:101–105

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rameez Raja Kureshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kureshi, R.R., Mishra, B.K. (2022). A Comparative Study of Data Encryption Techniques for Data Security in the IoT Device. In: Dahal, K., Giri, D., Neogy, S., Dutta, S., Kumar, S. (eds) Internet of Things and Its Applications. Lecture Notes in Electrical Engineering, vol 825. Springer, Singapore. https://doi.org/10.1007/978-981-16-7637-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7637-6_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7636-9

  • Online ISBN: 978-981-16-7637-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics