[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Comprehensive Evaluation of Cryptographic Ciphers on Secure Publish/Subscribe Communications for IoT Devices

  • Conference paper
  • First Online:
Innovations in Smart Cities Applications Volume 5 (SCA 2021)

Abstract

The Internet of Things (IoT) is the concept of connecting the electronic objects we use in our daily lives to the Internet and allowing them to communicate with one another. These devices can collect a large amount of data, monitor objects, reduce workload, and boost efficiency by saving resources. All of these scenarios highlight the significance of security. Cryptography is an important aspect of information security in today’s society. Cryptography is the technique of transforming information and using codes to make encrypted conversations so that only the people for whom the information is intended are processed. Cryptographic algorithms can be used in a variety of ways. In an ideal world, a low-cost, high-performance encryption method would be needed. In our study, we applied and analyzed in detail the cost and performance of the widely used cryptographic algorithms 3DES, AES, Blowfish, CAST5, RC4, and RSA on Raspberry Pi 4 an IoT based devices to secure the publish/subscribe communication method used for the communication of these devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 223.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 279.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 279.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010

    Article  MATH  Google Scholar 

  2. E. Al-Masri et al., Investigating messaging protocols for the internet of things (IoT). IEEE Access 8, 94880–94911 (2020). https://doi.org/10.1109/ACCESS.2020.2993363

    Article  Google Scholar 

  3. R. Bryce G. Srivastava, The addition of geolocation to sensor networks, in Proceedings of the 13th International Conference on Software Technologies, Porto, Portugal (2018), pp. 762–768. https://doi.org/10.5220/0006921907620768.

  4. MQTT: The Standard for IoT Messaging (2012), http://mqtt.org

  5. Apache Kafka, https://kafka.apache.org/. Accessed 6 June 2021

  6. RabbitMQ 2021. Messaging that just works, https://www.rabbitmq.com/

  7. ActiveMQ 2021. Flexible & Powerful Open Source Multi-Protocol Messaging, https://activemq.apache.org/

  8. K. Deshpande, P. Singh, Performance evaluation of cryptographic ciphers on IoT devices, p. 6 (2018)

    Google Scholar 

  9. W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638

    Article  MathSciNet  MATH  Google Scholar 

  10. M. Mikhail, Y. Abouelseoud, G. Elkobrosy, Extension and application of El-Gamal encryption scheme, in 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Hammamet, Tunisia, January 2014 (2014), pp. 1–6. https://doi.org/10.1109/WCCAIS.2014.6916627

  11. a-review-on-asymmetric-cryptography-rsa-and-elgamal-algorithm.pdf

    Google Scholar 

  12. E. Jincharadze, Critical analysis of some cryptography algorithms, p. 9 (2017)

    Google Scholar 

  13. H. Khurana, Scalable security and accounting services for contentbased publish/subscribe systems, in Proceedings of the 2005 ACM symposium on Applied computing (ACM, 2005), p. 807

    Google Scholar 

  14. W. Chen, J. Jiang, N. Skocik, On the privacy protection in publish/subscribe systems, in Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security, June 2010, pp. 597–601

    Google Scholar 

  15. L. Opyrchal, A. Prakash, Secure distribution of events in content-based publish subscribe systems. Ann Arbor 1001, 42122–48109 (2001)

    Google Scholar 

  16. M. Srivatsa, L. Liu, Secure event dissemination in publish–subscribe networks, in Proceedings of the 27th International Conference on Distributed Computing Systems (Citeseer, 2007), p. 22

    Google Scholar 

  17. S. Kumar, T. Wollinger, Fundamentals of Symmetric Cryptography, in Embedded Security in Cars. ed. by K. Lemke, C. Paar, M. Wolf (Springer, Heidelberg, 2006). https://doi.org/10.1007/3-540-28428-1_8

    Chapter  Google Scholar 

  18. W. Diffie, M.E. Hellman, Exhaustive cryptanalysis of the NBS data encryption standard (PDF). Computer 10(6), 74–84 (1977). https://doi.org/10.1109/C-M.1977.217750

    Article  Google Scholar 

  19. P. Karn, P. Metzger, W. Simpson, The ESP Triple DES Transform, September 1995 doi:https://doi.org/10.17487/RFC1851. RFC 1851

  20. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST), 26 November 2001

    Google Scholar 

  21. B. Schneier, Description of a new variable-length key, 64-bit block cipher (blowfish), in Fast Software Encryption. FSE 1993, ed. by R. Anderson. Lecture Notes in Computer Science, vol. 809 (Springer, Heidelberg, 1993), pp. 191–204. https://doi.org/10.1007/3-540-58108-1_24

    Chapter  Google Scholar 

  22. C.M. Adams, Constructing symmetric ciphers using the CAST design procedure (PDF). Designs Codes Cryptogr. 12(3), 283–316 (1997)

    Article  MathSciNet  Google Scholar 

  23. B. Jenkins, Re: RC4?. Newsgroup: sci.crypt, 15 September 1994

    Google Scholar 

  24. A. Al Hasib, A.A.M.M. Haque, A comparative study of the performance and security issues of AES and RSA cryptography, in Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 2, no. November 2001 (2008), pp. 505–510

    Google Scholar 

  25. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  26. K. Birman, T. Joseph, Exploiting virtual synchrony in distributed systems, in Proceedings of the Eleventh ACM Symposium on Operating Systems Principles - SOSP 1987 (1987), pp. 123–138. doi: https://doi.org/10.1145/41457.37515

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kul, S., Sayar, A. (2022). A Comprehensive Evaluation of Cryptographic Ciphers on Secure Publish/Subscribe Communications for IoT Devices. In: Ben Ahmed, M., Boudhir, A.A., Karaș, İ.R., Jain, V., Mellouli, S. (eds) Innovations in Smart Cities Applications Volume 5. SCA 2021. Lecture Notes in Networks and Systems, vol 393. Springer, Cham. https://doi.org/10.1007/978-3-030-94191-8_93

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-94191-8_93

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-94190-1

  • Online ISBN: 978-3-030-94191-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics