Indonesian Journal of Electrical Engineering and Computer Science
Vol. 20, No. 2, November 2020, pp. 894~902
ISSN: 2502-4752, DOI: 10.11591/ijeecs.v20.i2.pp 894-902 894
Journal homepage: http://ijeecs.iaescore.com
Compare encryption performance across devices to ensure the
security of the IOT
A.YU. Pyrkova, ZH.E. Temirbekova
Faculty of Information Technology, Al-Farabi Kazakh National University, Kazakhstan
Article Info ABSTRACT
Article history:
Received Mar 3, 2020
Revised May 1, 2020
Accepted May 15, 2020
The Internet of Things (IoT) combines many devices with various platforms,
computing capabilities and functions. The heterogeneity of the network and
the ubiquity of IoT devices place increased demands on security and privacy
protection. Therefore, cryptographic mechanisms must be strong enough to
meet these increased requirements, but at the same time they must be
effective enough to be implemented on devices with disabilities. One of
the limited devices are microcontrollers and smart cards. This paper presents
the performance and memory limitations of modern cryptographic primitives
and schemes on various types of devices that can be used in IoT. In this
article, we provided a detailed assessment of the performance of the most
commonly used cryptographic algorithms on devices with disabilities that
often appear on IoT networks. We relied on the most popular open source
microcontroller development platform, on the mbed platform. To provide a
data protection function, we used cryptography asymmetric fully
homomorphic encryption in the binary ring and symmetric cryptography
AES 128 bit. In addition, we compared run-time encryption and decryption
on a personal computer (PC) with Windows 7, the Bluetooth Low Energy
(BLE) Nano Kit microcontroller, the BLE Nano 1.5, and the smartcard
ML3-36k-R1.
Keywords:
BLE nano microcontroller
mbed platform
Homomorphic encryption in a
binary number ring
Smartcard ML3-36k-R1
cryptography
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Temirbekova Zhanerke Erlanovna,
Faculty of Information Technology,
Al-Farabi Kazakh National University,
Al-Farabi Avenue, 71, Almaty, Kazakhstan.
Email: temyrbekovazhanerke2@gmail.com
1. INTRODUCTION
The Internet of Things (IoT) has tightly entered our lives and billions of people around the world.
However, an increase in the number of connected devices leads to an increase in security risks: from physical
harm to people to downtime and damage to equipment - it can even be pipelines, blast furnaces and plants for
generating electricity. Since a number of such IoT facilities and systems have already been attacked and
significant damage has been done, ensuring their protection comes to the fore. As IoT technologies evolve,
the number of devices connected to each other is also increasing. These devices provide an unprecedented
ability to identify and control the environment. Sensor data can be transferred between devices via remote
data to the analyzed center. The security of this technology is still a big question, because it is still unsafe by
nature. For embedded systems, this is not a new security issue [1-3]. Security issues such as eavesdropping
can illegally affect people’s daily activities, even a -legitimate subject can collect data without user consent.
The easiest way to ensure data privacy is to apply encryption to the data [4, 5].
The IoT, like any rapidly developing technology, is experiencing a number of “growth diseases”,
among which the most serious is the security problem. The more “smart” devices are connected to
the network, the higher the risks associated with unauthorized access to the IoT system and the use of its
capabilities by attackers.