Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 23, pp 32633–32657 | Cite as

Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications

  • Norah Alassaf
  • Adnan Gutub
  • Shabir A. ParahEmail author
  • Manal Al Ghamdi
Article

Abstract

Multimedia communication is revolutionizing all major spheres of human life. The advent of IoT and its applications in many fields like sensing, healthcare and industry, result exponential increase in multimedia data, that needs to be shared over insecure networks. IoT driven setups are however constrained in terms of resources as a result of their small size. From data security point of view a conventional algorithms cannot be used for data encryption on an IoT platform given the resource constraints. The work presented in this paper studies the performance of SIMON cryptographic algorithm and proposes a light-weight-cryptography algorithm based on SIMON for its possible use in an IoT driven setup. The focus is on speed enhancement benefitting from software prospective, making it different than common studies mostly reflecting hardware implementations. To achieve performance in practical prospective, the contribution looks into SIMON cipher’s characteristics considering utilizing it for internet of things (IoT) healthcare applications. The paper suggests further improvement to implement the original SIMON cryptography in order to reduce the encryption time and maintain the practical trade-off between security and performance. The proposed work has been compared to Advanced Encryption Standard (AES) and the original SIMON block cipher algorithms in terms of execution time, memory consumption. The results show that the proposed work is suitable for securing data in an IoT driven setup.

Keywords

Internet of things Medical data AES SIMON cipher Light weight cryptography 

Notes

Acknowledgements

The authors acknowledge all support provided by Umm Al-Qura University (UQU) for encouraging this research work. Special thanks goes to the cooperation between the two UQU departments via Prof. Adnan Gutub from Computer Engineering and Dr Manal Al Ghamdi from Computer Sciences for motivating this research as well as building international collaboration with Dr Shabir Parah from the department of Electronics and IT, University of Kashmir, Srinagar, all working in collaboration on this wonderful research contributions.

References

  1. 1.
    AlAssaf N, AlKazemi B, Gutub A (2017) Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems. Journal of Research in Engineering and Applied Sciences (JREAS) 2(2):50–58Google Scholar
  2. 2.
    Alharthi N, Gutub A (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research 2(1):9–18.  https://doi.org/10.20448/808.2.1.9.18 CrossRefGoogle Scholar
  3. 3.
    Alizadeh J, AlKhzaimi H, Aref MR, Bagheri N, Gauravaram P, Kumar A, Lauridsen M, Sanadhya S (2014) Cryptanalysis of SIMON Variants with Connections. International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec), Lecture Notes in Computer Science Vol. 8651, pp. 90–107, SpringerGoogle Scholar
  4. 4.
    Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences, Published by ElsevierGoogle Scholar
  5. 5.
    Aly S, AlGhamdi T, Salim M, Amin H, Gutub A (2014) Information Gathering Schemes for Collaborative Sensor Devices. Procedia Computer Science, Elsevier 32:1141–1146CrossRefGoogle Scholar
  6. 6.
    Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference (DAC '15). ACM, New YorkGoogle Scholar
  7. 7.
    Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2017) Notes on the design and analysis of SIMON and SPECK. IACR Cryptology ePrint Archive 560Google Scholar
  8. 8.
    Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) S and S: Block Ciphers for the Internet of Things. IACR Cryptography ePrint ArchiveGoogle Scholar
  9. 9.
    Ciabattoni L, Freddi A, Longhi S, Monteriù A, Pepa L, Prist M (2016) An open and modular hardware node for wireless sensor and body area networks. Journal of SensorsGoogle Scholar
  10. 10.
    Daemen J, Rijmen V (1999) AES proposal: RijndaelGoogle Scholar
  11. 11.
    Dandekar AK, Pradhan S, Ghormade S (2016) Design of AES-512 algorithm for communication network. IRJET-International Research Journal of Engineering and Technology 3(5)Google Scholar
  12. 12.
    Dinu D, Corre YL, Khovratovich D, Perrin L, Großschädl J, Biryukov A (2015) Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 209Google Scholar
  13. 13.
    Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences 28(3):262–275CrossRefGoogle Scholar
  14. 14.
    Elhoseny M, González GR, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608CrossRefGoogle Scholar
  15. 15.
    Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable ComputingGoogle Scholar
  16. 16.
    Elhoseny M, Yuan X, El-Minir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks 9(13):2024–2031Google Scholar
  17. 17.
    Farouk A, Batle J, Elhoseny M, Naseri M, Lone M, Fedorov A, Alkhambashi M, Ahmed SH, Abdel-Aty M (2018) Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front Phys 13(2):130306CrossRefGoogle Scholar
  18. 18.
    Ghouti L, Ibrahim MK, Gutub AA (2013) Method of Performing Elliptic Polynomial Cryptography with Elliptic Polynomial Hopping. USPTO: United States Patents & Trademark Office, Patent number: US_8385541, Filing date: Feb 18, 2010, Patent Issue date: Feb 26Google Scholar
  19. 19.
    Gulcan E, Aysu A, Schaumont P (2014) A Flexible and Compact Hardware Architecture for The SIMON Block Cipher. Third International Workshop on Lightweight Cryptography for Security and Privacy: LightSec 2014, PP. 34–50. IstanbulGoogle Scholar
  20. 20.
    Gutub A (2003) High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. IEEE 10th Annual Technical Exchange Meeting, KFUPM, DhahranGoogle Scholar
  21. 21.
    Gutub A (2006) Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture. International Journal of Computer Science and Network Security (IJCSNS) 6(3A):44–52Google Scholar
  22. 22.
    Gutub A (2011) Subthreshold SRAM Designs for Cryptography Security Computations. In: ICSECS 2011 - 2nd International Conference on Software Engineering and Computer Systems, Universiti Malaysia Pahang, KuantanCrossRefGoogle Scholar
  23. 23.
    Gutub A (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, RiyadhGoogle Scholar
  24. 24.
    Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal. Springer .  https://doi.org/10.1007/s11042-017-5293-6ISSN 1380-7501
  25. 25.
    Gutub A, Khan E (2011) Using Subthreshold SRAM to Design Low-Power Crypto Hardware. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2):474–483Google Scholar
  26. 26.
    Gutub A, Khan F (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. In: International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Palace of the Golden Horses, Kuala LumpurGoogle Scholar
  27. 27.
    Gutub A, Tabakh AA, Al-Qahtani A, Amin A (2013) Serial vs. Parallel Elliptic Curve Crypto Processor Designs. In: IADIS International Conference: Applied Computing 2013, pp. 67–74, Fort WorthGoogle Scholar
  28. 28.
    Gutub A, Tahhan H (2008) Efficient Adders to Speedup Modular Multiplication For Cryptography. WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, UAEGoogle Scholar
  29. 29.
    Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services (SERVICES), PP. 21–28Google Scholar
  30. 30.
    Hosseinzadeh J, Hosseinzadeh M (2016) A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation. International Journal of Advances in Computer Science 5(4):31–41Google Scholar
  31. 31.
    Kölbl S, Leander G, Tiessen T (2015) Observations on the SIMON block cipher family. Annual Cryptology Conference, pp. 161–185, SpringerGoogle Scholar
  32. 32.
    Kugler P, Nordhus P, Eskofier B (2013) Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Body Sensor Networks (BSN), IEEE International Conference on (pp. 1–6). IEEEGoogle Scholar
  33. 33.
    Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876–19897CrossRefGoogle Scholar
  34. 34.
    Mora H, Gil D, Terol RM, Azorín J, Szymanski J (2017) An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments. Sensors 17(10):2302CrossRefGoogle Scholar
  35. 35.
    Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS 9(5):1938–1962Google Scholar
  36. 36.
    Nithya R, Kumar DS (2016) Where AES is for Internet, SIMON could be for IoT. Procedia Technology Journal 25:302–309CrossRefGoogle Scholar
  37. 37.
    Parah S, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230CrossRefGoogle Scholar
  38. 38.
    Parah S, Akhoon J, Sheikh J, Loan NA, Bhat GM (2015) A high capacity data hiding scheme based on edge detection and even-odd plane separation. Annual IEEE India Conference (INDICON), pp. 1–5Google Scholar
  39. 39.
    Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) Nonlinear Dynamics, A new secure and robust watermarking technique based on logistic map and modification of DC coefficient, In press
  40. 40.
    Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems, Internet of Things and Big Data Analytics Toward Next-Generation Intelligence, Edited book, pp. 409–437
  41. 41.
    Parah S, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E healthcare. Multimedia Tools and Applications 76(8):10599–10633 SpringerCrossRefGoogle Scholar
  42. 42.
    Parah SA, Sheikh JA, Bhat GM (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst.  https://doi.org/10.1016/j.future.2018.02.023
  43. 43.
    Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278CrossRefGoogle Scholar
  44. 44.
    Shehab A, Ismail A, Osman L, Elhoseny M, El-Henawy IM (2017) Quantified Self Using IoT Wearable Devices. In International Conference on Advanced Intelligent Systems and Informatics. (pp. 820–831). Springer, ChamGoogle Scholar
  45. 45.
    Trad A, Bahattab A, Othman S (2014) Performance Trade-offs of Encryption Algorithms for Wireless Sensor Networks. IEEE World Congress on Computer Applications and Information Systems (WCCAIS), PP. 1–6Google Scholar
  46. 46.
    Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the Architecture of Internet of Things. IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 5:484–487Google Scholar
  47. 47.
    Yang G, Zhu B, Suder V, Aagaard MD, Gong G (2015) The Simeck Family of Lightweight Block Ciphers. CHES: International Workshop on Cryptographic Hardware and Embedded Systems, PP. 307–329, SpringerGoogle Scholar
  48. 48.
    Zajac P (2017) Upper bounds on the complexity of algebraic crypt- analysis of ciphers with a low multiplicative complexity. Des Codes Crypt 82(1):43–56CrossRefGoogle Scholar
  49. 49.
    Zhang W, Thurow K, Stoll R (2014) A knowledge-based telemonitoring platform for application in remote healthcare. International Journal of Computers Communications & Control 9(5):644–654CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Norah Alassaf
    • 1
  • Adnan Gutub
    • 1
  • Shabir A. Parah
    • 2
    Email author
  • Manal Al Ghamdi
    • 3
  1. 1.Department of Computer EngineeringUmm Al-Qura University (UQU)MakkahSaudi Arabia
  2. 2.Department of Electronics and Instrumentation TechnologyUniversity of KashmirSrinagarIndia
  3. 3.Department of Computer SciencesUmm AL-Qura UniversityMakkahSaudi Arabia

Personalised recommendations