Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Multimedia communication is revolutionizing all major spheres of human life. The advent of IoT and its applications in many fields like sensing, healthcare and industry, result exponential increase in multimedia data, that needs to be shared over insecure networks. IoT driven setups are however constrained in terms of resources as a result of their small size. From data security point of view a conventional algorithms cannot be used for data encryption on an IoT platform given the resource constraints. The work presented in this paper studies the performance of SIMON cryptographic algorithm and proposes a light-weight-cryptography algorithm based on SIMON for its possible use in an IoT driven setup. The focus is on speed enhancement benefitting from software prospective, making it different than common studies mostly reflecting hardware implementations. To achieve performance in practical prospective, the contribution looks into SIMON cipher’s characteristics considering utilizing it for internet of things (IoT) healthcare applications. The paper suggests further improvement to implement the original SIMON cryptography in order to reduce the encryption time and maintain the practical trade-off between security and performance. The proposed work has been compared to Advanced Encryption Standard (AES) and the original SIMON block cipher algorithms in terms of execution time, memory consumption. The results show that the proposed work is suitable for securing data in an IoT driven setup.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. AlAssaf N, AlKazemi B, Gutub A (2017) Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems. Journal of Research in Engineering and Applied Sciences (JREAS) 2(2):50–58

    Google Scholar 

  2. Alharthi N, Gutub A (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research 2(1):9–18. https://doi.org/10.20448/808.2.1.9.18

    Article  Google Scholar 

  3. Alizadeh J, AlKhzaimi H, Aref MR, Bagheri N, Gauravaram P, Kumar A, Lauridsen M, Sanadhya S (2014) Cryptanalysis of SIMON Variants with Connections. International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec), Lecture Notes in Computer Science Vol. 8651, pp. 90–107, Springer

  4. Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences, Published by Elsevier

  5. Aly S, AlGhamdi T, Salim M, Amin H, Gutub A (2014) Information Gathering Schemes for Collaborative Sensor Devices. Procedia Computer Science, Elsevier 32:1141–1146

    Article  Google Scholar 

  6. Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference (DAC '15). ACM, New York

  7. Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2017) Notes on the design and analysis of SIMON and SPECK. IACR Cryptology ePrint Archive 560

  8. Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) S and S: Block Ciphers for the Internet of Things. IACR Cryptography ePrint Archive

  9. Ciabattoni L, Freddi A, Longhi S, Monteriù A, Pepa L, Prist M (2016) An open and modular hardware node for wireless sensor and body area networks. Journal of Sensors

  10. Daemen J, Rijmen V (1999) AES proposal: Rijndael

  11. Dandekar AK, Pradhan S, Ghormade S (2016) Design of AES-512 algorithm for communication network. IRJET-International Research Journal of Engineering and Technology 3(5)

  12. Dinu D, Corre YL, Khovratovich D, Perrin L, Großschädl J, Biryukov A (2015) Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 209

  13. Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences 28(3):262–275

    Article  Google Scholar 

  14. Elhoseny M, González GR, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608

    Article  Google Scholar 

  15. Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable Computing

  16. Elhoseny M, Yuan X, El-Minir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks 9(13):2024–2031

    Google Scholar 

  17. Farouk A, Batle J, Elhoseny M, Naseri M, Lone M, Fedorov A, Alkhambashi M, Ahmed SH, Abdel-Aty M (2018) Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front Phys 13(2):130306

    Article  Google Scholar 

  18. Ghouti L, Ibrahim MK, Gutub AA (2013) Method of Performing Elliptic Polynomial Cryptography with Elliptic Polynomial Hopping. USPTO: United States Patents & Trademark Office, Patent number: US_8385541, Filing date: Feb 18, 2010, Patent Issue date: Feb 26

  19. Gulcan E, Aysu A, Schaumont P (2014) A Flexible and Compact Hardware Architecture for The SIMON Block Cipher. Third International Workshop on Lightweight Cryptography for Security and Privacy: LightSec 2014, PP. 34–50. Istanbul

  20. Gutub A (2003) High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran

  21. Gutub A (2006) Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture. International Journal of Computer Science and Network Security (IJCSNS) 6(3A):44–52

    Google Scholar 

  22. Gutub A (2011) Subthreshold SRAM Designs for Cryptography Security Computations. In: ICSECS 2011 - 2nd International Conference on Software Engineering and Computer Systems, Universiti Malaysia Pahang, Kuantan

    Chapter  Google Scholar 

  23. Gutub A (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh

  24. Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal. Springer . https://doi.org/10.1007/s11042-017-5293-6ISSN 1380-7501

  25. Gutub A, Khan E (2011) Using Subthreshold SRAM to Design Low-Power Crypto Hardware. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2):474–483

    Google Scholar 

  26. Gutub A, Khan F (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. In: International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Palace of the Golden Horses, Kuala Lumpur

  27. Gutub A, Tabakh AA, Al-Qahtani A, Amin A (2013) Serial vs. Parallel Elliptic Curve Crypto Processor Designs. In: IADIS International Conference: Applied Computing 2013, pp. 67–74, Fort Worth

  28. Gutub A, Tahhan H (2008) Efficient Adders to Speedup Modular Multiplication For Cryptography. WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, UAE

  29. Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services (SERVICES), PP. 21–28

  30. Hosseinzadeh J, Hosseinzadeh M (2016) A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation. International Journal of Advances in Computer Science 5(4):31–41

    Google Scholar 

  31. Kölbl S, Leander G, Tiessen T (2015) Observations on the SIMON block cipher family. Annual Cryptology Conference, pp. 161–185, Springer

  32. Kugler P, Nordhus P, Eskofier B (2013) Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Body Sensor Networks (BSN), IEEE International Conference on (pp. 1–6). IEEE

  33. Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876–19897

    Article  Google Scholar 

  34. Mora H, Gil D, Terol RM, Azorín J, Szymanski J (2017) An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments. Sensors 17(10):2302

    Article  Google Scholar 

  35. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS 9(5):1938–1962

    Google Scholar 

  36. Nithya R, Kumar DS (2016) Where AES is for Internet, SIMON could be for IoT. Procedia Technology Journal 25:302–309

    Article  Google Scholar 

  37. Parah S, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230

    Article  Google Scholar 

  38. Parah S, Akhoon J, Sheikh J, Loan NA, Bhat GM (2015) A high capacity data hiding scheme based on edge detection and even-odd plane separation. Annual IEEE India Conference (INDICON), pp. 1–5

  39. Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) Nonlinear Dynamics, A new secure and robust watermarking technique based on logistic map and modification of DC coefficient, In press

  40. Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems, Internet of Things and Big Data Analytics Toward Next-Generation Intelligence, Edited book, pp. 409–437

  41. Parah S, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E healthcare. Multimedia Tools and Applications 76(8):10599–10633 Springer

    Article  Google Scholar 

  42. Parah SA, Sheikh JA, Bhat GM (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2018.02.023

  43. Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278

    Article  Google Scholar 

  44. Shehab A, Ismail A, Osman L, Elhoseny M, El-Henawy IM (2017) Quantified Self Using IoT Wearable Devices. In International Conference on Advanced Intelligent Systems and Informatics. (pp. 820–831). Springer, Cham

    Google Scholar 

  45. Trad A, Bahattab A, Othman S (2014) Performance Trade-offs of Encryption Algorithms for Wireless Sensor Networks. IEEE World Congress on Computer Applications and Information Systems (WCCAIS), PP. 1–6

  46. Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the Architecture of Internet of Things. IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 5:484–487

    Google Scholar 

  47. Yang G, Zhu B, Suder V, Aagaard MD, Gong G (2015) The Simeck Family of Lightweight Block Ciphers. CHES: International Workshop on Cryptographic Hardware and Embedded Systems, PP. 307–329, Springer

  48. Zajac P (2017) Upper bounds on the complexity of algebraic crypt- analysis of ciphers with a low multiplicative complexity. Des Codes Crypt 82(1):43–56

    Article  Google Scholar 

  49. Zhang W, Thurow K, Stoll R (2014) A knowledge-based telemonitoring platform for application in remote healthcare. International Journal of Computers Communications & Control 9(5):644–654

    Article  Google Scholar 

Download references

Acknowledgements

The authors acknowledge all support provided by Umm Al-Qura University (UQU) for encouraging this research work. Special thanks goes to the cooperation between the two UQU departments via Prof. Adnan Gutub from Computer Engineering and Dr Manal Al Ghamdi from Computer Sciences for motivating this research as well as building international collaboration with Dr Shabir Parah from the department of Electronics and IT, University of Kashmir, Srinagar, all working in collaboration on this wonderful research contributions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alassaf, N., Gutub, A., Parah, S.A. et al. Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl 78, 32633–32657 (2019). https://doi.org/10.1007/s11042-018-6801-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6801-z

Keywords