{"title":"保护物联网(IoT)设备的比较方法:AES与Simon-Speck加密","authors":"Baiq Yuniar Yustiarini, Favian Dewanta, H. Nuha","doi":"10.1109/ICISIT54091.2022.9872666","DOIUrl":null,"url":null,"abstract":"Delivering information from Internet of Things (IoT) devices to a cloud server possesses several security issues, e.g. information eavesdropping, modification, and theft. Therefore, communication between IoT devices and the cloud server should be protected by encryption methods. However, there are few encryption techniques options that are suitable for the need for lightweight communication as demanded by the IoT devices. Due to these circumstances, the NSA launched an encryption algorithm for IoT named Simon and Speck, which are maximally efficient while still providing the advertised level of security, as determined by the key size. This study aims to test and compare the Simon-Speck and AES encryption algorithms and their effect on networking performance on IoT devices. The parameters in this test are delay, throughput, the efficiency of memory usage from the encryption algorithm, and the value of the avalanche effect. Experimental results show that the Speck algorithm outperforms the Simon and the AES algorithms in terms of communication delay and memory usage. Regarding the avalanche effect values, the Simon algorithm possesses the highest avalanche effect value on average against the Speck and the AES algorithms.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Comparative Method for Securing Internet of Things (IoT) Devices: AES vs Simon-Speck Encryptions\",\"authors\":\"Baiq Yuniar Yustiarini, Favian Dewanta, H. Nuha\",\"doi\":\"10.1109/ICISIT54091.2022.9872666\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Delivering information from Internet of Things (IoT) devices to a cloud server possesses several security issues, e.g. information eavesdropping, modification, and theft. Therefore, communication between IoT devices and the cloud server should be protected by encryption methods. However, there are few encryption techniques options that are suitable for the need for lightweight communication as demanded by the IoT devices. Due to these circumstances, the NSA launched an encryption algorithm for IoT named Simon and Speck, which are maximally efficient while still providing the advertised level of security, as determined by the key size. This study aims to test and compare the Simon-Speck and AES encryption algorithms and their effect on networking performance on IoT devices. The parameters in this test are delay, throughput, the efficiency of memory usage from the encryption algorithm, and the value of the avalanche effect. Experimental results show that the Speck algorithm outperforms the Simon and the AES algorithms in terms of communication delay and memory usage. Regarding the avalanche effect values, the Simon algorithm possesses the highest avalanche effect value on average against the Speck and the AES algorithms.\",\"PeriodicalId\":214014,\"journal\":{\"name\":\"2022 1st International Conference on Information System & Information Technology (ICISIT)\",\"volume\":\"329 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 1st International Conference on Information System & Information Technology (ICISIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISIT54091.2022.9872666\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 1st International Conference on Information System & Information Technology (ICISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISIT54091.2022.9872666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Method for Securing Internet of Things (IoT) Devices: AES vs Simon-Speck Encryptions
Delivering information from Internet of Things (IoT) devices to a cloud server possesses several security issues, e.g. information eavesdropping, modification, and theft. Therefore, communication between IoT devices and the cloud server should be protected by encryption methods. However, there are few encryption techniques options that are suitable for the need for lightweight communication as demanded by the IoT devices. Due to these circumstances, the NSA launched an encryption algorithm for IoT named Simon and Speck, which are maximally efficient while still providing the advertised level of security, as determined by the key size. This study aims to test and compare the Simon-Speck and AES encryption algorithms and their effect on networking performance on IoT devices. The parameters in this test are delay, throughput, the efficiency of memory usage from the encryption algorithm, and the value of the avalanche effect. Experimental results show that the Speck algorithm outperforms the Simon and the AES algorithms in terms of communication delay and memory usage. Regarding the avalanche effect values, the Simon algorithm possesses the highest avalanche effect value on average against the Speck and the AES algorithms.