Speeding Up the Internet of Things: LEAIoT: A Lightweight Encryption Algorithm Toward Low-Latency Communication for the Internet of Things

2018 ◽  
Vol 7 (6) ◽  
pp. 31-37 ◽  
Author(s):  
Muhammad Asif Habib ◽  
Mudassar Ahmad ◽  
Sohail Jabbar ◽  
Syed Hassan Ahmed ◽  
Joel J.P.C. Rodrigues
2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Author(s):  
Norliza Katuk ◽  
Ikenna Rene Chiadighikaobi

Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many zero blocks that lead to a pattern and make it easier for attackers to obtain an encryption key. Thus, this research proposed header and zero blocks bypass method during the block pre-processing to overcome this problem. First, the original PRESENT algorithm was enhanced by incorporating the block pre-processing phase. Then, the algorithm’s performance was tested using three measures: time, memory usage, and CPU usage for encrypting and decrypting fingerprint templates. This study demonstrated that the proposed method encrypted and decrypted the fingerprint templates faster with the same CPU usage of the original algorithm but consumed higher memory. Thus, it has the potential to be used in IoT environments for security.


Author(s):  
Luca Davoli ◽  
Laura Belli ◽  
Gianluigi Ferrari

The Internet of Things (IoT) paradigm is foreseeing the development of our environment towards new enriched spaces in most areas of modern living, such as digital health, smart cities, and smart agriculture. Several IoT applications also have real-time and low-latency requirements and must rely on specific architectures. The authors refer to the paradigm that best fits the selected IoT scenario as “Big Stream” because it considers real-time constraints. Moreover, the blockchain concept has drawn attention as the next-generation technology through the authentication of peers that share encryption and the generation of hash values. In addition, the blockchain can be applied in conjunction with Cloud Computing and the IoT paradigms, since it avoids the involvement of third parties in a broker-free way. In this chapter, an analysis on mechanisms that can be adopted to secure Big Stream data in a graph-based platform, thus delivering them to consumers in an efficient and secure way, and with low latency, is shown, describing all refinements required employing federation-based and blockchain paradigms.


Sign in / Sign up

Export Citation Format

Share Document