2017
DOI: 10.1155/2017/2046735
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems

Abstract: The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices brings significant processing and energy consumption overheads. These overheads are mainly determined by algorithmic efficiency, quality of implementation, and operating system. Benchmarks of symmetric primitives exist in the literature for WSN platforms but they are mostly focused on single platforms or single operating systems. Moreover, they are not up to date with respect to implementations and/or operating systems vers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0
3

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(33 citation statements)
references
References 30 publications
0
30
0
3
Order By: Relevance
“…His goal was to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of cipher text or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption. Our implemented hybrid cryptography algorithm (Triple DES & Krishna) shows a better result than the results presented in [1], [2].…”
Section: Resultsmentioning
confidence: 77%
See 1 more Smart Citation
“…His goal was to use various cryptography concepts during communication along with its application in cloud computing and to enhance the security of cipher text or encrypted data in cloud servers along with minimizing the consumption of time, cost and memory size during encryption and decryption. Our implemented hybrid cryptography algorithm (Triple DES & Krishna) shows a better result than the results presented in [1], [2].…”
Section: Resultsmentioning
confidence: 77%
“…Jiehong et al, [1] provided evaluation of three of the common encryption algorithms: AES, Blowfish, and GOST. A comparison has been conducted for those encryption algorithms at different sizes of data blocks.…”
Section: Resultsmentioning
confidence: 99%
“…However, one of the challenges in IoT is to provide the right performance/security trade‐off. Pereira et al evaluated the performance of different algorithms in IoT platforms.…”
Section: Related Workmentioning
confidence: 99%
“…This was possible to be achieved due to a careful selection and integration of cryptographic algorithms so that users can explore the tradeoff between security and resource usage [12]. As a result, based on both the knowledge of the cryptographic algorithms trade-offs (e.g., security levels, block sizes) and on the broader vision of the devices/resources within an SDN network, the SDN controller is able to make improved routing decisions for establishing communication flows that minimize network energy consumption.…”
Section: Introductionmentioning
confidence: 99%