Lizard cipher for IoT security on constrained devices

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Over the past decades, security become the most challenging task in Internet of Things. Therefore, a convenient hardware cryptographic module is required to provide accelerated cryptographic operations such as encryption. This study investigates the implementation of Lizard cipher on three Arduino platforms to determine its performance. This study is successful in implementing Lizard cipher on Arduino platform as a constrained devices and resulting 0.98 MB of memory utilization. The execution time of Lizard cipher is compared among Arduino variants, i.e Arduino Mega, Arduino Nano and Arduino Uno with ANOVA test. Tukey's HSD post-hoc test reveales that the execution time is significantly slower in Arduino Mega compared to Arduino Nano and Arduino Uno. This result will help IoT security engineers in selecting a lightweight cipher that is suitable for constraints of the target device.

Cite

CITATION STYLE

APA

Kusyanti, A., Primananda, R., & Saputro, K. J. (2019). Lizard cipher for IoT security on constrained devices. International Journal of Advanced Computer Science and Applications, 10(11), 507–511. https://doi.org/10.14569/IJACSA.2019.0101169

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free