Skip to main content

Investigation of the IoT Device Lifetime with Secure Data Transmission

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2019, ruSMART 2019)

Abstract

This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cisco Visual Networking Index: Forecast and Trends, 2017–2022. White Paper. Cisco (2019)

    Google Scholar 

  2. Top Strategic IoT Trends and Technologies Through 2023. Gartner report. Gartner (2019)

    Google Scholar 

  3. Wadud, Z., et al.: Lifetime maximization via hole alleviation in iot enabling heterogeneous wireless sensor networks. Sensors (Basel) 17(7), 1677 (2017)

    Article  Google Scholar 

  4. Mallick, S., et al.: Performance appraisal of wireless energy harvesting in IoT. In: 3rd International Conference on Electrical Information and Communication Technology (EICT), IEEE, Khulna, Bangladesh, pp. 1–6 (2017)

    Google Scholar 

  5. Casals, L., Mir, B., Vidal, R., Gomez, C.: Modeling the energy performance of LoRaWAN. Sensors 17(10), 2364 (2017)

    Article  Google Scholar 

  6. Carlsson, A., Kuzminykh, I., Franksson, R., Liljegren, A.: Measuring a LoRa network: performance, possibilities and limitations. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2018. LNCS, vol. 11118, pp. 116–128. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_11

    Chapter  Google Scholar 

  7. Fafoutis, X., Elsts, A., Vafeas, A., Oikonomou, G., Piechocki, R.: On Predicting the battery lifetime of IoT devices: experiences from the SPHERE deployments. In: RealWSN 2018 Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks, ACM, New York, Shenzhen, China, pp. 7–12 (2018)

    Google Scholar 

  8. Kim, T., Kim, S.H., Kim, D.: Distributed topology construction in ZigBee wireless networks. Wireless Pers. Commun. 103(3), 2213–2227 (2018)

    Article  Google Scholar 

  9. Popov, O., Kuzminykh, I.: Analysis of methods for reducing topology in wireless sensor networks. In: 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine, pp. 529–532 (2018)

    Google Scholar 

  10. Lemeshko, A.V., Evseeva, O.Y., Garkusha, S.V.: Research on tensor model of multipath routing in telecommunication network with support of service quality by great number of indices. Telecommun. Radio Eng. 73(15), 1339–1360 (2014)

    Article  Google Scholar 

  11. Sokolov, V., Carlsson, A., Kuzminykh, I.: Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), IEEE, Kharkov, Ukraine, pp. 564–568 (2017)

    Google Scholar 

  12. Kuzminykh, I., Snihurov, A., Carlsson, A.: Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), IEEE, Lviv, Ukraine, pp. 133–136 (2017)

    Google Scholar 

  13. Morin, E., Maman, M., Guizzetti, R., Duda, A.: Comparison of the device lifetime in wireless networks for the internet of things. IEEE Access 5, 7097–7114 (2017)

    Article  Google Scholar 

  14. Ahmad, A., Swidan, A., Saifan, R.: Comparative analysis of different encryption techniques in mobile ad hoc networks (MANETS). Int. J. Comput. Networks Commun. (IJCNC) 8(2), 89–101 (2016)

    Article  Google Scholar 

  15. Panait, C., Dragomir, D.: Measuring the performance and energy consumption of AES in wireless sensor networks. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, Lodz, Poland (2015), pp. 1261–1266 (2015)

    Google Scholar 

  16. Sahu, S.K., Kushwaha, A.: Performance analysis of symmetric encryption algorithms for mobile ad hoc network. Int. J. Emerg. Technol. Adv. Eng. 4(6), 619–624 (2014)

    Google Scholar 

  17. Elminaam, D.S., Kader, H., Hadhoud, M.: Energy efficiency of encryption schemes for wireless devices. Int. J. Comput. Theory Eng. 1, 302–309 (2009)

    Article  Google Scholar 

  18. Yevdokymenko, M., Mayangani, M., Zalushniy, D., Sleiman, B.: Analysis of methods for assessing the reliability and security of infocommunication network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 199–202 (2017)

    Google Scholar 

  19. Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC, vol. 689, pp. 631–655. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70581-1_44

    Chapter  Google Scholar 

  20. Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_4

    Chapter  Google Scholar 

  21. Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1–18. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_1

    Chapter  Google Scholar 

  22. Buchanan, W.J., Li, S., Asif, R.: Lightweight cryptography methods. J. Cyber Secur. Technol. 1(3–4), 187–201 (2017)

    Article  Google Scholar 

  23. Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, Jaipur, India, pp. 1725–1729 (2016)

    Google Scholar 

  24. Deshpande, K., Singh, P.: Performance evaluation of cryptographic ciphers on IoT devices. In: International Conference on Recent Trends in Computational Engineering and Technologies (ICTRCET 2018), Bangalore, India, pp. 1–6 (2018)

    Google Scholar 

  25. Yevdokymenko, M., Elsayed, M., Onwuakpa, P.: Ethical hacking and penetration testing using Raspberry Pi. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 179–181 (2017)

    Google Scholar 

  26. Recommendation Y400/Y.2060: Overview of the Internet of things. ITU-T (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ievgeniia Kuzminykh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuzminykh, I., Carlsson, A., Yevdokymenko, M., Sokolov, V. (2019). Investigation of the IoT Device Lifetime with Secure Data Transmission. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics