Efficient Hardware Implementation for IoT Security System

A. Shisha, Maha Aboelmaged, Rola Aboshabaan, Amr Hassan, Mariam M. Fouad, M. A. E. Ghany
{"title":"Efficient Hardware Implementation for IoT Security System","authors":"A. Shisha, Maha Aboelmaged, Rola Aboshabaan, Amr Hassan, Mariam M. Fouad, M. A. E. Ghany","doi":"10.1109/NILES50944.2020.9257939","DOIUrl":null,"url":null,"abstract":"With the evolution of IoT and its involvement in everyday life, the amount of data collected by IoT devices is increasing drastically and user’s information is becoming more vulnerable to cyber-attacks. Thus, comes the importance of IoT security and the importance to have a flexible security system which doesn’t affect the IoT devices power consumption and efficiency. In this paper an efficient dynamic security system that uses partial reconfiguration concept in zed board is presented to achieve better data security and faster generation of the encrypted data. Algorithm hopping is used to switch between three different cryptographic cyphers which are AEGIS, ASCON and DEOXYS-II. These ciphers are the main finalists in CAESAR competition as they achieved high security, medium security and low security respectively and each of these ciphers has its own significant attributes. The proposed design targets the improvement of reconfiguration time of the zed board using LZ4 (Lempel-Ziv4) compression and decompression techniques for the input bitstream files. Our research shows a decrease in the reconfiguration time of a minimum 61.3% decrease for the largest bit file in comparison to the previous works in the same field.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NILES50944.2020.9257939","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the evolution of IoT and its involvement in everyday life, the amount of data collected by IoT devices is increasing drastically and user’s information is becoming more vulnerable to cyber-attacks. Thus, comes the importance of IoT security and the importance to have a flexible security system which doesn’t affect the IoT devices power consumption and efficiency. In this paper an efficient dynamic security system that uses partial reconfiguration concept in zed board is presented to achieve better data security and faster generation of the encrypted data. Algorithm hopping is used to switch between three different cryptographic cyphers which are AEGIS, ASCON and DEOXYS-II. These ciphers are the main finalists in CAESAR competition as they achieved high security, medium security and low security respectively and each of these ciphers has its own significant attributes. The proposed design targets the improvement of reconfiguration time of the zed board using LZ4 (Lempel-Ziv4) compression and decompression techniques for the input bitstream files. Our research shows a decrease in the reconfiguration time of a minimum 61.3% decrease for the largest bit file in comparison to the previous works in the same field.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网安全系统的高效硬件实现
随着物联网的发展及其对日常生活的参与,物联网设备收集的数据量正在急剧增加,用户的信息越来越容易受到网络攻击。因此,物联网安全的重要性和拥有一个灵活的安全系统的重要性,不影响物联网设备的功耗和效率。本文提出了一种有效的动态安全系统,该系统在zed板上采用部分重构的概念,以达到更好的数据安全性和更快的加密数据生成速度。算法跳变用于在AEGIS、ASCON和DEOXYS-II三种不同的密码之间进行切换。这些密码分别达到了高安全性,中等安全性和低安全性,并且每个密码都有自己的重要属性,因此是CAESAR比赛的主要决赛选手。提出的设计目标是利用LZ4 (Lempel-Ziv4)压缩和解压缩技术对输入的比特流文件进行压缩,以改善zed板的重构时间。我们的研究表明,与同一领域的先前工作相比,最大位文件的重新配置时间至少减少了61.3%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Decentralized Intersection Management of Autonomous Vehicles Using Nonlinear MPC Low power and area SHA-256 hardware accelerator on Virtex-7 FPGA Dynamic Programming Applications: A Suvrvey Self-Organizing Maps to Assess Rehabilitation Progress of Post-Stroke Patients SoC loosely Coupled Navigation Algorithm Evaluation via 6-DOF Flight Simulation Model of Guided Bomb
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1