An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices

Abstract

In recent years, small computing devices like embedded devices, wireless sensors, RFID tags (Radio Frequency Identification), Internet of Things (IoT) devices are increasing rapidly. They are expected to generate massive amount of sensitive data for controlling and monitoring purposes. But their resources and capabilities are limited. Those also work with valuable private data thus making security of those devices of paramount importance. Therefore, a secure encryption algorithm should be there to protect those vulnerable devices. Conventional encryption ciphers like RSA or AES are computationally expensive; require large memory but hinder performances of those devices. Simple encryption techniques, on the other hand are easy to crack, compromising security. In this paper a secure and efficient lightweight cryptographic algorithm for small computing devices has been proposed. It is a symmetric key block cipher, employing custom substitution-permutation (SP) network and a modified Feistel architecture. Two basic concepts from Genetic algorithm are used. A Linux based benchmark tool, FELICS is used for the measurement and MATLAB for the purpose of encryption quality testing. An improvement over the existing algorithm, the proposed algorithm reduces the use of processing cycles but at the same time provides sufficient security.

Authors and Affiliations

Sohel Rana, Saddam Hossain, Hasan Imam Shoun, Dr. Mohammod Abul Kashem

Keywords

Related Articles

High-Speed FPGA-based of the Particle Swarm Optimization using HLS Tool

The Particle Swarm Optimization (PSO) is a heuristic search method inspired by different biological populations on their swarming or collaborative behavior. This novel work has implemented PSO for the Travelling Salesman...

Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique

Mobile ad hoc network (MANET) is an autonomous self-configuring infrastructure-less wireless network. MANET is vulnerable to a lot of routing security threats due to unreliability of its nodes that are highly involved in...

Secured Multi-Hop Clustering Protocol for Location-based Routing in VANETs

In today’s world, with the rise in the count of vehicles and lack of proper navigation, the congestion has become a major problem. In this scenario, VANETs play a very important part in improving the traffic condition an...

Smart Home Energy Management System Design: A Realistic Autonomous V2H / H2V Hybrid Energy Storage System

The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were pr...

Wyner-Ziv Video Coding using Hadamard Transform and Deep Learning

Predictive schemes are current standards of video coding. Unfortunately they do not apply well for lightweight devices such as mobile phones. The high encoding complexity is the bottleneck of the Quality of Experience (Q...

Download PDF file
  • EP ID EP417654
  • DOI 10.14569/IJACSA.2018.091137
  • Views 118
  • Downloads 0

How To Cite

Sohel Rana, Saddam Hossain, Hasan Imam Shoun, Dr. Mohammod Abul Kashem (2018). An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices. International Journal of Advanced Computer Science & Applications, 9(11), 267-275. https://europub.co.uk/articles/-A-417654