Performance Evaluation of Trivium on Raspberry Pi
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.
Authors and Affiliations
Ari Kusyanti, Syahifudin Shahid, Harin Puspa Ayu Catherina, Yazid Samanhudi
SecFHIR: A Security Specification Model for Fast Healthcare Interoperability Resources
Patients taking medical treatment in distinct healthcare institutions have their information deeply fragmented between very different locations. All this information --- probably with different formats --- may be used or...
Multi-input Multi-output Beta Wavelet Network: Modeling of Acoustic Units for Speech Recognition
In this paper, we propose a novel architecture of wavelet network called Multi-input Multi-output Wavelet Network MIMOWN as a generalization of the old architecture of wavelet network. This newel prototype was applied to...
Information Management System based on Principles of Adaptability and Personalization
Among the most significant values of a business system that contribute to its competitiveness in comparison with others, the leading point and the highest value, second to the human factor, is the information at the comp...
Performance Comparison of QEC Network based JAVA Application and Web based PHP Application
Every organization wants to automate the manual system for moving and storing their data in particular format. A QEC department takes feedback of teacher evaluation manually from the students in the university that is so...
Software Abstractions for Large-Scale Deep Learning Models in Big Data Analytics
The goal of big data analytics is to analyze datasets with a higher amount of volume, velocity, and variety for large-scale business intelligence problems. These workloads are normally processed with the distribution on...