ASIC and FPGA Comparative Study for IoT Lightweight Hardware Security Algorithms

2019 ◽  
Vol 28 (12) ◽  
pp. 1930009 ◽  
Author(s):  
Nagham Samir ◽  
Abdelrahman Sobeih Hussein ◽  
Mohaned Khaled ◽  
Ahmed N. El-Zeiny ◽  
Mahetab Osama ◽  
...  

Data security, privacy and authenticity are crucial in wireless data transmission. Low power consumption is the main requirement for any chip design targeting the Internet of Things (IoT) applications. In this research paper, a comparative study of eight authenticated encryption and decryption algorithms, selected from the “Competition for Authenticated Encryption: Security, Applicability and Robustness” (CAESAR), namely, ACORN, ASCON, CLOC, JOLTIK, MORUS, PRIMATEs, SCREAM and SILC, is presented. The FPGA and ASIC implementations of these eight algorithms are synthesized, placed and routed. Power, area, latency and throughput are measured for all algorithms. All results are analyzed to determine the most suitable algorithm for IoT applications. These results show that ACORN algorithm exhibits the lowest power consumption of the eight studied at the expense of lower throughput and higher latency. MORUS algorithm gives the highest throughput among the eight selected algorithms at the expense of large area utilization.

2015 ◽  
Vol 76 ◽  
pp. 302-307 ◽  
Author(s):  
Aina Mardhiyah M. Ghazali ◽  
W.Z.W. Hasan ◽  
M.N. Hamidun ◽  
Ahmed H. Sabry ◽  
S.A. Ahmed ◽  
...  

Author(s):  
M. K. Nurgaliyev ◽  
A. K. Saymbetov ◽  
B. N. Zholamanov ◽  
A. Т. Yeralkhanova ◽  
G. B. Zhuman

Real-time monitoring systems and sensors are not complete without wireless data transmission modules. Improving energy efficiency requires examining various system parameters that affect the power consumption of transmitting and receiving devices. The most important parameter of any autonomous wireless network is its uptime. In this work, we used LoRa wireless modules on the SX1278 chip manufactured by Semtech to determine their power consumption in various operating modes. The obtained data were used to build a consumption model of the device when connected to a receiver. Three operating modes are considered: transmit mode, receive mode and sleep mode. In an ideal communication channel, all transmitted data reaches the receiver with 100% probability. In a real situation, data reaches the receiver with a certain probability, depending on the communication channel, transmission power, distance to the addressee, and network parameters. In this work, the occurrence of an error is random. In this case, the occurrence of an error during reception entails a lack of confirmation of receipt or a request for re-sending data. Sending data again increases the power consumption of the device and, consequently, decreases the operating time of the wireless device. This paper shows the dependences of the operating time on various initial monitored parameters of the device, such as: confirmation timeout, packet length, time of one transmission cycle and the maximum number of retransmissions in one cycle. The developed model for predicting the consumption of the device can be used in the design of autonomous wireless sensor monitoring networks.


Author(s):  
Linh Manh Pham

Many domains of human life are more and moreimpacted by applications of the Internet of Things (i.e., IoT).The embedded devices produce masses of data day after dayrequiring a strong network infrastructure. The inclusion ofmessaging protocols like MQTT is important to ensure as fewerrors as possible in sending millions of IoT messages. Thisprotocol is a great component of the IoT universe due to itslightweight design and low power consumption. DistributedMQTT systems are typically needed in actual applicationenvironments because centralized MQTT methods cannotaccommodate a massive volume of data. Although beingscalable decentralized MQTT systems, they are not suited totraffic workload variability. IoT service providers may incurexpense because the computing resources are overestimated.This points to the need for a new approach to adapt workloadfluctuation. Through proposing a modular MQTT framework,this article provides such an elasticity approach. In order toguarantee elasticity of MQTT server cluster while maintainingintact IoT implementation, the MQTT framework used offthe-shelf components. The elasticity feature of our frameworkis verified by various experiments.


2014 ◽  
Vol 513-517 ◽  
pp. 850-853
Author(s):  
Xiang Jun Su ◽  
Guan Qi Guo ◽  
Liang Ji Liu

Using NRF905 wireless data transmission and STM32 microprocessor chips, a dormitory disciplinary monitoring and management system is designed. It can be real-time monitoring of each bedroom sound information and smoke information. Through the rational design of data frame structure, the system power consumption is minimal, with lowest system cost and ease of expansion.


2012 ◽  
Vol 17 (4) ◽  
pp. 319-326 ◽  
Author(s):  
Zbigniew Chaniecki ◽  
Krzysztof Grudzień ◽  
Tomasz Jaworski ◽  
Grzegorz Rybak ◽  
Andrzej Romanowski ◽  
...  

Abstract The paper presents results of the scale-up silo flow investigation in based on accelerometer signal analysis and Wi-Fi transmission, performed in distributed laboratory environment. Prepared, by the authors, a set of 8 accelerometers allows to measure a three-dimensional acceleration vector. The accelerometers were located outside silo, on its perimeter. The accelerometers signal changes allowed to analyze dynamic behavior of solid (vibrations/pulsations) at silo wall during discharging process. These dynamic effects are caused by stick-slip friction between the wall and the granular material. Information about the material pulsations and vibrations is crucial for monitoring the interaction between silo construction and particle during flow. Additionally such spatial position of accelerometers sensor allowed to collect information about nonsymmetrical flow inside silo.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document