Abstract
The Internet of things (IoT) has been widely used around the world and the use of IoT applications has been increasing. Because of its accessibility with the existing communication and computing capacity, the IoT application domain has been widening. But, as it has been the issue of security and privacy in other communication-based application, the IoT device-based applications have also been under the threat of attacks. There have been risks of both physical damaging on the devices and digital cyber attacks. To apply the security on the digital IoT system, lightweight cryptography techniques have been used as an alternative to minimize any potential threats and hence make the system more secure. Over the years, different encryption algorithms such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, and many others have been implemented in different IoT applications. However, selecting the right algorithm has always been challenging. In this paper, a comparative analysis in terms of the encryption process and throughput has been analyzed for AES, DES, 3DES, and Blowfish algorithms. As an IoT application, Raspberry Pi 3B+ based system for sensing humidity and temperature has been designed for the experimental comparison among these algorithms. In the application, the sensor data has been transmitted to the server using different encryption algorithms having varying key lengths. The comparative analysis of the encryption process time and throughput has been analysed to evaluate the strength and weaknesses of each encryption algorithm in our IoT application. The experimental results have shown that DES and 3DES algorithm has the minimum time requirement for encryption whereas Blowfish has the highest throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Punia A, Gupta D, Jaiswal S (2017) A perspective on available security techniques in IoT. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), IEEE, pp 1553–1559
Goyal P, Batra S, Singh A (2010) A literature review of security attack in mobile ad-hoc networks. Int J Comput Appl 9:11–15
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. pp 648–651
Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for IoT devices. In: 2018 IEEE Long Island systems, applications and technology conference (LISAT), pp 1–8
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6:8182–8201
SuĂ¡rez-Albela M, FernĂ¡ndez-CaramĂ©s TM, Fraga-Lamas P, Castedo L (2018) A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: 2018 global internet of things summit (GIoTS), IEEE, pp 1–6
Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the internet of things. Digital Commun Netw 4:118–137
Mendez Mena D, Papapanagiotou I, Yang B (2018) Internet of things: survey on security. Inform Secur J: Global Perspect 27:162–182
Mohamad Noor Mb, Hassan WH (2019) Current research on internet of things (IoT) security: a survey. Comput Netw 148:283–294
Wen Q, Dong X, Zhang R (2012) Application of dynamic variable cipher security certificate in internet of things. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems, IEEE, pp. 1062–1066
Thangavel R, Palanisamy B (2011) Efficient approach towards an agent-based dynamic web service discovery framework with QoS support. In: International symposium on computing, communication, and control (ISCCC), Citeseer, pp 74–78
Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humanized Comput 1–18
Maitra S, Richards D, Abdelgawad A, Yelamarthi K (2019) Performance evaluation of IoT encryption algorithms: memory, timing, and energy. In: 2019 IEEE sensors applications symposium (SAS), pp 1–6
Zeebaree SR (2020) DES encryption and decryption algorithm implementation based on FPGA. Indones J Electr Eng Comput Sci 18:774–781
Wang Z, Yao Y, Tong X, Luo Q, Chen X (2019) Dynamically reconfigurable encryption and decryption system design for the internet of things information security. Sensors 19:143
Joshy A, Jalaja M (2017) Design and implementation of an IoT based secure biometric authentication system. In: 2017 IEEE international conference on signal processing, informatics, communication and energy systems (SPICES), IEEE, pp 1–13
Hussaini S (2020) Cyber security in cloud using blowfish encryption. Int J Inform Technol (IJIT) 6
Mohammed AF, Qyser AAM (2019) A hybrid approach for secure iris-based authentication in IoT. In: International conference on intelligent computing and communication technologies, Springer, pp 159–167
Bui D-H, Puschini D, Bacles-Min S, Beigné E, Tran X-T (2016) Ultra low-power and low-energy 32-bit datapath AES architecture for IoT applications. In: 2016 International conference on IC design and technology (ICICDT), IEEE, pp 1–4
Fahd S, Afzal M, Abbas H, Iqbal W, Waheed S (2018) Correlation power analysis of modes of encryption in AES and its countermeasures. Futur Gener Comput Syst 83:496–509
Srinivasarao D (2011) Analyzing the superlative symmetric cryptographic encryption algorithm. J Global Res Comput Sci 2:101–105
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kureshi, R.R., Mishra, B.K. (2022). A Comparative Study of Data Encryption Techniques for Data Security in the IoT Device. In: Dahal, K., Giri, D., Neogy, S., Dutta, S., Kumar, S. (eds) Internet of Things and Its Applications. Lecture Notes in Electrical Engineering, vol 825. Springer, Singapore. https://doi.org/10.1007/978-981-16-7637-6_40
Download citation
DOI: https://doi.org/10.1007/978-981-16-7637-6_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-7636-9
Online ISBN: 978-981-16-7637-6
eBook Packages: EngineeringEngineering (R0)