Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation
Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-05-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/11/2484 |
id |
doaj-ef85f57f52b94bdb9fef7962d2d2f388 |
---|---|
record_format |
Article |
spelling |
doaj-ef85f57f52b94bdb9fef7962d2d2f3882020-11-25T02:28:27ZengMDPI AGSensors1424-82202019-05-011911248410.3390/s19112484s19112484Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental EvaluationSudip Maitra0Kumar Yelamarthi1College of Science and Engineering, Central Michigan University, Mt Pleasant, MI 48859, USACollege of Science and Engineering, Central Michigan University, Mt Pleasant, MI 48859, USAInternet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in IoT applications. This research addresses this gap by presenting the design, implementation, and practical evaluation of a rapidly deployable IoT architecture with embedded data security. Utilizing open-source off-the-shelf components and widely accepted encryption algorithms, this research presents a comparative study of Advanced Encryption Standards (AES) with and without hardware accelerators and an eXtended Tiny Encryption Algorithm (XTEA) to analyze the performance in memory, energy, and execution time. Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers. Additionally, software implementation of AES on 8-bit PIC architecture required 6.36x more program memory than XTEA.https://www.mdpi.com/1424-8220/19/11/2484block ciphersedge computingIoT securitymodular architectureAESXTEA |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sudip Maitra Kumar Yelamarthi |
spellingShingle |
Sudip Maitra Kumar Yelamarthi Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation Sensors block ciphers edge computing IoT security modular architecture AES XTEA |
author_facet |
Sudip Maitra Kumar Yelamarthi |
author_sort |
Sudip Maitra |
title |
Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation |
title_short |
Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation |
title_full |
Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation |
title_fullStr |
Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation |
title_full_unstemmed |
Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation |
title_sort |
rapidly deployable iot architecture with data security: implementation and experimental evaluation |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2019-05-01 |
description |
Internet of Things (IoT) has brought about a new horizon in the field of pervasive computing and integration of heterogeneous objects connected to the network. The broad nature of its applications requires a modular architecture that can be rapidly deployed. Alongside the increasing significance of data security, much research has focused on simulation-based encryption algorithms. Currently, there is a gap in the literature on identifying the effect of encryption algorithms on timing and energy consumption in IoT applications. This research addresses this gap by presenting the design, implementation, and practical evaluation of a rapidly deployable IoT architecture with embedded data security. Utilizing open-source off-the-shelf components and widely accepted encryption algorithms, this research presents a comparative study of Advanced Encryption Standards (AES) with and without hardware accelerators and an eXtended Tiny Encryption Algorithm (XTEA) to analyze the performance in memory, energy, and execution time. Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers. Additionally, software implementation of AES on 8-bit PIC architecture required 6.36x more program memory than XTEA. |
topic |
block ciphers edge computing IoT security modular architecture AES XTEA |
url |
https://www.mdpi.com/1424-8220/19/11/2484 |
work_keys_str_mv |
AT sudipmaitra rapidlydeployableiotarchitecturewithdatasecurityimplementationandexperimentalevaluation AT kumaryelamarthi rapidlydeployableiotarchitecturewithdatasecurityimplementationandexperimentalevaluation |
_version_ |
1724837979637153792 |