Performance Evaluation of Trivium on Raspberry Pi
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.
Authors and Affiliations
Ari Kusyanti, Syahifudin Shahid, Harin Puspa Ayu Catherina, Yazid Samanhudi
Managing and Reducing Handoffs Latency in Wireless Local Area Networks using Multi-Channel Virtual Access Points
The time is era of computer technology and relevant hybrid disciplines to emerge as a multi impact entity in the technological world. In the same stream where user of technology is increasing the expectation from the tec...
Security Issues in Software Defined Networking (SDN): Risks, Challenges and Potential Solutions
SDN (Software Defined Networking) is an architecture that aims to improve the control of network and flexibility. It is mainly connected with open flow protocol and ODIN V2 for wireless communication. Its architecture is...
Gaze Direction based Mobile Application for Quadriplegia Wheelchair Control System
People with quadriplegia recruit the interest of researchers in introducing automated movement systems for adopted special purpose wheelchairs. These systems were introduced for easing the movement of such type of disabl...
Face Recognition using SIFT Key with Optimal Features Selection Model
Facial expression is complex in nature due to legion of variations present. These variations are identified and recorded using feature extraction mechanisms. The researchers have worked towards it and created classifiers...
Detecting Public Sentiment of Medicine by Mining Twitter Data
The paper presents a computational method that mines, processes and analyzes Twitter data for detecting public sentiment of medicine. Self-reported patient data are collected over a period of three months by mining the T...