Lightweight security algorithm for low power IoT devices

In today's technology, ever increasing number of electronics applications require secure communication, for example the Internet of things devices. Elliptic Curve Diffie Hellman (EC-DH) Algorithm has emerged as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange techniques that include the Diffie-Hellman Key agreement scheme. When contrasted with conventional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in lower power consumption, speedier calculations, and also lower memory and transmission capacity (bandwidth) reserve. This is particularly valid and helpful for applications like IoT gadgets, which are regularly constrained regarding their CPU processing speed, power, and area. This work includes the software and hardware implementation of Diffie-Hellman, Elliptic Curve Diffie-Hellman (ECDH) Key agreement algorithm, and RSA algorithm. The proposed work also involves analysis of power, performance, area, and their comparisons thereof. The comparison is based on metrics obtained, after implementing the algorithms in synopsys using 90 nm UMC Faraday library. The ECDH algorithm is found to be better than others as far as power and area are concerned.

[1]  K. Muneeswaran,et al.  Implementation of text based cryptosystem using Elliptic Curve Cryptography , 2009, 2009 First International Conference on Advanced Computing.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Kien A. Hua,et al.  ThingStore: a platform for internet-of-things application development and deployment , 2015, DEBS.

[4]  Dario Bonino,et al.  ALMANAC: Internet of Things for Smart Cities , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[5]  J. Pollard,et al.  Monte Carlo methods for index computation () , 1978 .

[6]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[7]  Milan Petkovic,et al.  Secure Data Management : 10th VLDB workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings , 2014 .

[8]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Christian Callegari,et al.  Advances in Computing, Communications and Informatics (ICACCI) , 2015 .

[13]  Min Chen,et al.  A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.