Abstract
The Internet of Things (IoT) is the concept of connecting the electronic objects we use in our daily lives to the Internet and allowing them to communicate with one another. These devices can collect a large amount of data, monitor objects, reduce workload, and boost efficiency by saving resources. All of these scenarios highlight the significance of security. Cryptography is an important aspect of information security in today’s society. Cryptography is the technique of transforming information and using codes to make encrypted conversations so that only the people for whom the information is intended are processed. Cryptographic algorithms can be used in a variety of ways. In an ideal world, a low-cost, high-performance encryption method would be needed. In our study, we applied and analyzed in detail the cost and performance of the widely used cryptographic algorithms 3DES, AES, Blowfish, CAST5, RC4, and RSA on Raspberry Pi 4 an IoT based devices to secure the publish/subscribe communication method used for the communication of these devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
L. Atzori, A. Iera, G. Morabito, The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010
E. Al-Masri et al., Investigating messaging protocols for the internet of things (IoT). IEEE Access 8, 94880–94911 (2020). https://doi.org/10.1109/ACCESS.2020.2993363
R. Bryce G. Srivastava, The addition of geolocation to sensor networks, in Proceedings of the 13th International Conference on Software Technologies, Porto, Portugal (2018), pp. 762–768. https://doi.org/10.5220/0006921907620768.
MQTT: The Standard for IoT Messaging (2012), http://mqtt.org
Apache Kafka, https://kafka.apache.org/. Accessed 6 June 2021
RabbitMQ 2021. Messaging that just works, https://www.rabbitmq.com/
ActiveMQ 2021. Flexible & Powerful Open Source Multi-Protocol Messaging, https://activemq.apache.org/
K. Deshpande, P. Singh, Performance evaluation of cryptographic ciphers on IoT devices, p. 6 (2018)
W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638
M. Mikhail, Y. Abouelseoud, G. Elkobrosy, Extension and application of El-Gamal encryption scheme, in 2014 World Congress on Computer Applications and Information Systems (WCCAIS), Hammamet, Tunisia, January 2014 (2014), pp. 1–6. https://doi.org/10.1109/WCCAIS.2014.6916627
a-review-on-asymmetric-cryptography-rsa-and-elgamal-algorithm.pdf
E. Jincharadze, Critical analysis of some cryptography algorithms, p. 9 (2017)
H. Khurana, Scalable security and accounting services for contentbased publish/subscribe systems, in Proceedings of the 2005 ACM symposium on Applied computing (ACM, 2005), p. 807
W. Chen, J. Jiang, N. Skocik, On the privacy protection in publish/subscribe systems, in Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security, June 2010, pp. 597–601
L. Opyrchal, A. Prakash, Secure distribution of events in content-based publish subscribe systems. Ann Arbor 1001, 42122–48109 (2001)
M. Srivatsa, L. Liu, Secure event dissemination in publish–subscribe networks, in Proceedings of the 27th International Conference on Distributed Computing Systems (Citeseer, 2007), p. 22
S. Kumar, T. Wollinger, Fundamentals of Symmetric Cryptography, in Embedded Security in Cars. ed. by K. Lemke, C. Paar, M. Wolf (Springer, Heidelberg, 2006). https://doi.org/10.1007/3-540-28428-1_8
W. Diffie, M.E. Hellman, Exhaustive cryptanalysis of the NBS data encryption standard (PDF). Computer 10(6), 74–84 (1977). https://doi.org/10.1109/C-M.1977.217750
P. Karn, P. Metzger, W. Simpson, The ESP Triple DES Transform, September 1995 doi:https://doi.org/10.17487/RFC1851. RFC 1851
Announcing the ADVANCED ENCRYPTION STANDARD (AES) (PDF). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST), 26 November 2001
B. Schneier, Description of a new variable-length key, 64-bit block cipher (blowfish), in Fast Software Encryption. FSE 1993, ed. by R. Anderson. Lecture Notes in Computer Science, vol. 809 (Springer, Heidelberg, 1993), pp. 191–204. https://doi.org/10.1007/3-540-58108-1_24
C.M. Adams, Constructing symmetric ciphers using the CAST design procedure (PDF). Designs Codes Cryptogr. 12(3), 283–316 (1997)
B. Jenkins, Re: RC4?. Newsgroup: sci.crypt, 15 September 1994
A. Al Hasib, A.A.M.M. Haque, A comparative study of the performance and security issues of AES and RSA cryptography, in Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 2, no. November 2001 (2008), pp. 505–510
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
K. Birman, T. Joseph, Exploiting virtual synchrony in distributed systems, in Proceedings of the Eleventh ACM Symposium on Operating Systems Principles - SOSP 1987 (1987), pp. 123–138. doi: https://doi.org/10.1145/41457.37515
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kul, S., Sayar, A. (2022). A Comprehensive Evaluation of Cryptographic Ciphers on Secure Publish/Subscribe Communications for IoT Devices. In: Ben Ahmed, M., Boudhir, A.A., Karaș, İ.R., Jain, V., Mellouli, S. (eds) Innovations in Smart Cities Applications Volume 5. SCA 2021. Lecture Notes in Networks and Systems, vol 393. Springer, Cham. https://doi.org/10.1007/978-3-030-94191-8_93
Download citation
DOI: https://doi.org/10.1007/978-3-030-94191-8_93
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-94190-1
Online ISBN: 978-3-030-94191-8
eBook Packages: EngineeringEngineering (R0)