scholarly journals Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Shafi Ullah ◽  
Raja Zahilah

AbstractRobust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of general-purpose data manipulation tasks. Many encryption techniques have been introduced to address the inability of such devices, lacking in robust security provision at low cost. This article presents an encryption technique, implemented on a resource constrained IoT device (AVR ATmega2560) through utilizing fast execution and less memory consumption properties of curve25519 in a novel and efficient lightweight hash function. The hash function utilizes GMP library for multi-precision arithmetic calculations and pre-calculated curve points to devise a good cipher block using ECDH based key exchange protocols and large random prime number generator function.

Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3326 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Jesús García ◽  
Mauricio Sanchez

The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable to security attacks. Ciphers are a security primitive that can prevent some of the attacks; however, the constrained computing and energy resources of IoT devices impede them from implementing current ciphers. This article presents the stream cipher Generador de Bits Pseudo Aleatorios (GBPA) based on Salsa20 cipher, which is part of the eSTREAM project, but designed for resource-constrained IoT devices of Class 0. GBPA has lower program and data memory requirements compared with Salsa20 and lightweight ciphers. These properties allow low-cost resource-constrained IoT devices, 29.5% of the embedded systems in the market, to be able to implement a security service that they are currently incapable of, to preserve the user’s data privacy and protect the system from attacks that could damage it. For the evaluation of its output, three statistical test suites were used: NIST Statistical Test Suite (STS), DIEHARD and EACirc, with good results. The GBPA cipher provides security without having a negative impact on the computing resources of IoT devices.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 125 ◽  
Author(s):  
İbrahim Taştan ◽  
Mahmut Karaca ◽  
Arda Yurdakul

With the rise of Internet of Things (IoT), low-cost resource-constrained devices have to be more capable than traditional embedded systems, which operate on stringent power budgets. In order to add new capabilities such as learning, the power consumption planning has to be revised. Approximate computing is a promising paradigm for reducing power consumption at the expense of inaccuracy introduced to the computations. In this paper, we set forth approximate computing features of a processor that will exist in the next generation low-cost resource-constrained learning IoT devices. Based on these features, we design an approximate IoT processor which benefits from RISC-V ISA. Targeting machine learning applications such as classification and clustering, we have demonstrated that our processor reinforced with approximate operations can save power up to 23% for ASIC implementation while at least 90% top-1 accuracy is achieved on the trained models and test data set.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1935 ◽  
Author(s):  
Shancang Li ◽  
Houbing Song ◽  
Muddesar Iqbal

With the exponential growth of the Internet of Things (IoT) and cyber-physical systems (CPS), a wide range of IoT applications have been developed and deployed in recent years. To match the heterogeneous application requirements in IoT and CPS systems, many resource-constrained IoT devices are deployed, in which privacy and security have emerged as difficult challenges because the devices have not been designed to have effective security features.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 404
Author(s):  
Sangjae Lee ◽  
Mi-Kyung Oh ◽  
Yousung Kang ◽  
Dooho Choi

Keeping IoT devices secure has been a major challenge recently. One of the possible solutions to secure IoT devices is to use a physically unclonable function (PUF). A PUF is a security primitive that can generate device-specific cryptographic information by extracting the features of hardware uncertainty. Because PUF instances are very difficult to replicate even by the manufacturer, the generated bit sequence can be used as cryptographic keys or as a unique identifier for the device. Regarding the implementation of PUF, the majority of PUFs introduced over the past decade are in the form of active components and have been implemented as separate chips or embedded as a part of a chip, making it difficult to use them in low-cost IoT devices due to cost and design flexibility. One approach to easily adopt PUFs in resource-constrained IoT devices is to use passive components such as resistors and capacitors (RC) that can be configured at low cost. The main feature of this RC-based PUF is that it extracts the small difference caused by charging and discharging of RC circuits and uses it as a response. In this paper, we extend the previous research and show the possibility to secure IoT devices by using the RC-based PUF.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3039
Author(s):  
Zhao Huang ◽  
Liang Li ◽  
Yin Chen ◽  
Zeyu Li ◽  
Quan Wang ◽  
...  

With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. It utilizes the inherent nature of hardware to generate a random and unpredictable fingerprint to uniquely identify an IoT device. However, despite existing PUFs having exhibited a good performance, they are not suitable for effective application on resource-constrained IoT devices due to the limited number of challenge-response pairs (CRPs) generated per unit area and the large hardware resources overhead. To solve these problems, this article presents an ultra-lightweight reconfigurable PUF solution, which is named RPPUF. Our method is built on pico-PUF (PPUF). By incorporating configurable logics, one single RPPUF can be instantiated into multiple samples through configurable information K. We implement and verify our design on the Xilinx Spartan-6 field programmable gate array (FPGA) microboards. The experimental results demonstrate that, compared to previous work, our method increases the uniqueness, reliability and uniformity by up to 4.13%, 16.98% and 10.5%, respectively, while dramatically reducing the hardware resource overhead by 98.16% when a 128-bit PUF response is generated. Moreover, the bit per cost (BPC) metric of our proposed RPPUF increased by up to 28.5 and 53.37 times than that of PPUF and the improved butterfly PUF, respectively. This confirms that the proposed RPPUF is ultra-lightweight with a good performance, making it more appropriate and efficient to apply in FPGA-based IoT devices with constrained resources.


Alloy Digest ◽  
1983 ◽  
Vol 32 (5) ◽  

Abstract AISI 1030 is a plain carbon steel containing nominally 0.30% carbon. It is used in the hot-rolled, normalized, oil-quenched-and-tempered or water-quenched-and-tempered conditions for general-purpose engineering and construction. It provides medium strength and toughness at low cost. Among its many uses are axles, bolts, gears and building sections. All data are on a single heat of fine-grain steel. This datasheet provides information on composition, physical properties, hardness, elasticity, and tensile properties as well as fracture toughness. It also includes information on corrosion resistance as well as forming, heat treating, machining, joining, and surface treatment. Filing Code: CS-94. Producer or source: Carbon and alloy steel mills.


Alloy Digest ◽  
1971 ◽  
Vol 20 (6) ◽  

Abstract AISI 1040 is a medium-carbon steel used in the hot-rolled, normalized, oil quenched and tempered or water quenched and tempered condition for general purpose engineering and construction. It provides medium strength and toughness at low cost. This datasheet provides information on composition, physical properties, hardness, elasticity, and tensile properties as well as fracture toughness and fatigue. It also includes information on corrosion resistance as well as forming, heat treating, machining, joining, and surface treatment. Filing Code: CS-41. Producer or source: Carbon and alloy steel mills.


Alloy Digest ◽  
1979 ◽  
Vol 28 (4) ◽  

Abstract SAE 1037 is a carbon steel that provides medium strength and medium toughness at low cost. It is used in the hot-rolled, normalized, oil-quenched-and-tempered and water-quenched-and-tempered conditions. This medium-carbon steel is used for construction and for general-purpose engineering. This datasheet provides information on composition, physical properties, hardness, elasticity, and tensile properties as well as fracture toughness. It also includes information on corrosion resistance as well as forming, heat treating, machining, joining, and surface treatment. Filing Code: CS-76. Producer or source: Carbon steel mills.


Sign in / Sign up

Export Citation Format

Share Document