Abstract
This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used.
Keywords
- IoT
- Lifetime
- Power consumption
- Cryptographic algorithms
- Energy efficiency
This is a preview of subscription content, access via your institution.
Buying options



References
Cisco Visual Networking Index: Forecast and Trends, 2017–2022. White Paper. Cisco (2019)
Top Strategic IoT Trends and Technologies Through 2023. Gartner report. Gartner (2019)
Wadud, Z., et al.: Lifetime maximization via hole alleviation in iot enabling heterogeneous wireless sensor networks. Sensors (Basel) 17(7), 1677 (2017)
Mallick, S., et al.: Performance appraisal of wireless energy harvesting in IoT. In: 3rd International Conference on Electrical Information and Communication Technology (EICT), IEEE, Khulna, Bangladesh, pp. 1–6 (2017)
Casals, L., Mir, B., Vidal, R., Gomez, C.: Modeling the energy performance of LoRaWAN. Sensors 17(10), 2364 (2017)
Carlsson, A., Kuzminykh, I., Franksson, R., Liljegren, A.: Measuring a LoRa network: performance, possibilities and limitations. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2018. LNCS, vol. 11118, pp. 116–128. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_11
Fafoutis, X., Elsts, A., Vafeas, A., Oikonomou, G., Piechocki, R.: On Predicting the battery lifetime of IoT devices: experiences from the SPHERE deployments. In: RealWSN 2018 Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks, ACM, New York, Shenzhen, China, pp. 7–12 (2018)
Kim, T., Kim, S.H., Kim, D.: Distributed topology construction in ZigBee wireless networks. Wireless Pers. Commun. 103(3), 2213–2227 (2018)
Popov, O., Kuzminykh, I.: Analysis of methods for reducing topology in wireless sensor networks. In: 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine, pp. 529–532 (2018)
Lemeshko, A.V., Evseeva, O.Y., Garkusha, S.V.: Research on tensor model of multipath routing in telecommunication network with support of service quality by great number of indices. Telecommun. Radio Eng. 73(15), 1339–1360 (2014)
Sokolov, V., Carlsson, A., Kuzminykh, I.: Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), IEEE, Kharkov, Ukraine, pp. 564–568 (2017)
Kuzminykh, I., Snihurov, A., Carlsson, A.: Testing of communication range in ZigBee technology. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), IEEE, Lviv, Ukraine, pp. 133–136 (2017)
Morin, E., Maman, M., Guizzetti, R., Duda, A.: Comparison of the device lifetime in wireless networks for the internet of things. IEEE Access 5, 7097–7114 (2017)
Ahmad, A., Swidan, A., Saifan, R.: Comparative analysis of different encryption techniques in mobile ad hoc networks (MANETS). Int. J. Comput. Networks Commun. (IJCNC) 8(2), 89–101 (2016)
Panait, C., Dragomir, D.: Measuring the performance and energy consumption of AES in wireless sensor networks. In: 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, Lodz, Poland (2015), pp. 1261–1266 (2015)
Sahu, S.K., Kushwaha, A.: Performance analysis of symmetric encryption algorithms for mobile ad hoc network. Int. J. Emerg. Technol. Adv. Eng. 4(6), 619–624 (2014)
Elminaam, D.S., Kader, H., Hadhoud, M.: Energy efficiency of encryption schemes for wireless devices. Int. J. Comput. Theory Eng. 1, 302–309 (2009)
Yevdokymenko, M., Mayangani, M., Zalushniy, D., Sleiman, B.: Analysis of methods for assessing the reliability and security of infocommunication network. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 199–202 (2017)
Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: proactive and reactive approach. In: Shakhovska, N., Stepashko, V. (eds.) CSIT 2017. AISC, vol. 689, pp. 631–655. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-70581-1_44
Hong, D., et al.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006). https://doi.org/10.1007/11894063_4
Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1–18. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-25286-0_1
Buchanan, W.J., Li, S., Asif, R.: Lightweight cryptography methods. J. Cyber Secur. Technol. 1(3–4), 187–201 (2017)
Goyal, T.K., Sahula, V.: Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, Jaipur, India, pp. 1725–1729 (2016)
Deshpande, K., Singh, P.: Performance evaluation of cryptographic ciphers on IoT devices. In: International Conference on Recent Trends in Computational Engineering and Technologies (ICTRCET 2018), Bangalore, India, pp. 1–6 (2018)
Yevdokymenko, M., Elsayed, M., Onwuakpa, P.: Ethical hacking and penetration testing using Raspberry Pi. In: 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PICST), IEEE, Kharkov, Ukraine, pp. 179–181 (2017)
Recommendation Y400/Y.2060: Overview of the Internet of things. ITU-T (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kuzminykh, I., Carlsson, A., Yevdokymenko, M., Sokolov, V. (2019). Investigation of the IoT Device Lifetime with Secure Data Transmission. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-30859-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30858-2
Online ISBN: 978-3-030-30859-9
eBook Packages: Computer ScienceComputer Science (R0)