Skip to main content

Investigation of the IoT Device Lifetime with Secure Data Transmission

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 11660)

Abstract

This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used.

Keywords

  • IoT
  • Lifetime
  • Power consumption
  • Cryptographic algorithms
  • Energy efficiency

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-30859-9_2
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   89.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-30859-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   119.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.

References

  1. Cisco Visual Networking Index: Forecast and Trends, 2017–2022. White Paper. Cisco (2019)

    Google Scholar 

  2. Top Strategic IoT Trends and Technologies Through 2023. Gartner report. Gartner (2019)

    Google Scholar 

  3. Wadud, Z., et al.: Lifetime maximization via hole alleviation in iot enabling heterogeneous wireless sensor networks. Sensors (Basel) 17(7), 1677 (2017)

    CrossRef  Google Scholar 

  4. Mallick, S., et al.: Performance appraisal of wireless energy harvesting in IoT. In: 3rd International Conference on Electrical Information and Communication Technology (EICT), IEEE, Khulna, Bangladesh, pp. 1–6 (2017)

    Google Scholar 

  5. Casals, L., Mir, B., Vidal, R., Gomez, C.: Modeling the energy performance of LoRaWAN. Sensors 17(10), 2364 (2017)

    CrossRef  Google Scholar 

  6. Carlsson, A., Kuzminykh, I., Franksson, R., Liljegren, A.: Measuring a LoRa network: performance, possibilities and limitations. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2018. LNCS, vol. 11118, pp. 116–128. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_11

    CrossRef  Google Scholar 

  7. Fafoutis, X., Elsts, A., Vafeas, A., Oikonomou, G., Piechocki, R.: On Predicting the battery lifetime of IoT devices: experiences from the SPHERE deployments. In: RealWSN 2018 Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks, ACM, New York, Shenzhen, China, pp. 7–12 (2018)

    Google Scholar 

  8. Kim, T., Kim, S.H., Kim, D.: Distributed topology construction in ZigBee wireless networks. Wireless Pers. Commun. 103(3), 2213–2227 (2018)

    CrossRef  Google Scholar 

  9. Popov, O., Kuzminykh, I.: Analysis of methods for reducing topology in wireless sensor networks. In: 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine, pp. 529–532 (2018)

    Google Scholar 

  10. Lemeshko, A.V., Evseeva, O.Y., Garkusha, S.V.: Research on tensor model of multipath routing in telecommunication network with support of service quality by great number of indices. Telecommun. Radio Eng. 73(15), 1339–1360 (2014)

    CrossRef  Google Scholar 

  11. Sokolov, V., Carlsson, A., Kuzminykh, I.: Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), IEEE, Kharkov, Ukraine, pp. 564–568 (2017)

    Google Scholar 

  12. Kuzminykh, I., Snihurov, A., Carlsson, A.: Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), IEEE, Lviv, Ukraine, pp. 133–136 (2017)

    Google Scholar 

  13. Morin, E., Maman, M., Guizzetti, R., Duda, A.: Comparison of the device lifetime in wireless networks for the internet of things. IEEE Access 5, 7097–7114 (2017)

    CrossRef  Google Scholar 

  14. Ahmad, A., Swidan, A., Saifan, R.: Comparative analysis of different encryption techniques in mobile ad hoc networks (MANETS). Int. J. Comput. Networks Commun. (IJCNC) 8(2), 89–101 (2016)

    CrossRef  Google Scholar 

  15. Panait, C., Dragomir, D.: Measuring the performance and energy consumption of AES in wireless sensor networks. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, Lodz, Poland (2015), pp. 1261–1266 (2015)

    Google Scholar 

  16. Sahu, S.K., Kushwaha, A.: Performance analysis of symmetric encryption algorithms for mobile ad hoc network. Int. J. Emerg. Technol. Adv. Eng. 4(6), 619–624 (2014)

    Google Scholar 

  17. Elminaam, D.S., Kader, H., Hadhoud, M.: Energy efficiency of encryption schemes for wireless devices. Int. J. Comput. Theory Eng. 1, 302–309 (2009)

    CrossRef  Google Scholar 

  18. Yevdokymenko, M., Mayangani, M., Zalushniy, D., Sleiman, B.: Analysis of methods for assessing the reliability and security of infocommunication network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 199–202 (2017)

    Google Scholar 

  19. Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC, vol. 689, pp. 631–655. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70581-1_44

    CrossRef  Google Scholar 

  20. Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_4

    CrossRef  Google Scholar 

  21. Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1–18. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_1

    CrossRef  Google Scholar 

  22. Buchanan, W.J., Li, S., Asif, R.: Lightweight cryptography methods. J. Cyber Secur. Technol. 1(3–4), 187–201 (2017)

    CrossRef  Google Scholar 

  23. Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, Jaipur, India, pp. 1725–1729 (2016)

    Google Scholar 

  24. Deshpande, K., Singh, P.: Performance evaluation of cryptographic ciphers on IoT devices. In: International Conference on Recent Trends in Computational Engineering and Technologies (ICTRCET 2018), Bangalore, India, pp. 1–6 (2018)

    Google Scholar 

  25. Yevdokymenko, M., Elsayed, M., Onwuakpa, P.: Ethical hacking and penetration testing using Raspberry Pi. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 179–181 (2017)

    Google Scholar 

  26. Recommendation Y400/Y.2060: Overview of the Internet of things. ITU-T (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ievgeniia Kuzminykh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Kuzminykh, I., Carlsson, A., Yevdokymenko, M., Sokolov, V. (2019). Investigation of the IoT Device Lifetime with Secure Data Transmission. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)