Performance Evaluation of Trivium on Raspberry Pi
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.
Authors and Affiliations
Ari Kusyanti, Syahifudin Shahid, Harin Puspa Ayu Catherina, Yazid Samanhudi
Interpolation of Single Beam Echo Sounder Data for 3D Bathymetric Model
Transmitting sound waves into water, and measuring time interval between emission and return of a pulse, single beam echo sounder determines the depth of the sea. To obtain a bathymetric model representing sea-floor cont...
Development of Copeland Score Methods for Determine Group Decisions
Voting method requires to determine group decision of decision by each decision maker in group. Determination of decisions by group of decision maker requires voting methods. Copeland score is one of voting method that h...
A 1NF Data Model for Representing Time-Varying Data in Relational Framework
Attaching Date and Time to varying data plays a definite role in representing a dynamic domain and resources on the database systems. The conventional database stores current data and can only represent the knowledge in...
Value-Driven use Cases Triage for Embedded Systems: A Case Study of Cellular Phone
A well-defined and prioritized set of use cases enables the enhancement of an entire system by focusing on more important use cases identified in the previous iteration. These use cases are given more opportunities to be...
Multi-Criteria Wind Turbine Selection using Weighted Sum Approach
Wind energy is becoming a potential source for renewable and clean energy. An important factor that contributes to efficient generation of wind power is the use of appropriate wind turbine. However, the task of selecting...