Abstract
Multimedia communication is revolutionizing all major spheres of human life. The advent of IoT and its applications in many fields like sensing, healthcare and industry, result exponential increase in multimedia data, that needs to be shared over insecure networks. IoT driven setups are however constrained in terms of resources as a result of their small size. From data security point of view a conventional algorithms cannot be used for data encryption on an IoT platform given the resource constraints. The work presented in this paper studies the performance of SIMON cryptographic algorithm and proposes a light-weight-cryptography algorithm based on SIMON for its possible use in an IoT driven setup. The focus is on speed enhancement benefitting from software prospective, making it different than common studies mostly reflecting hardware implementations. To achieve performance in practical prospective, the contribution looks into SIMON cipher’s characteristics considering utilizing it for internet of things (IoT) healthcare applications. The paper suggests further improvement to implement the original SIMON cryptography in order to reduce the encryption time and maintain the practical trade-off between security and performance. The proposed work has been compared to Advanced Encryption Standard (AES) and the original SIMON block cipher algorithms in terms of execution time, memory consumption. The results show that the proposed work is suitable for securing data in an IoT driven setup.
Similar content being viewed by others
References
AlAssaf N, AlKazemi B, Gutub A (2017) Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems. Journal of Research in Engineering and Applied Sciences (JREAS) 2(2):50–58
Alharthi N, Gutub A (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research 2(1):9–18. https://doi.org/10.20448/808.2.1.9.18
Alizadeh J, AlKhzaimi H, Aref MR, Bagheri N, Gauravaram P, Kumar A, Lauridsen M, Sanadhya S (2014) Cryptanalysis of SIMON Variants with Connections. International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec), Lecture Notes in Computer Science Vol. 8651, pp. 90–107, Springer
Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences, Published by Elsevier
Aly S, AlGhamdi T, Salim M, Amin H, Gutub A (2014) Information Gathering Schemes for Collaborative Sensor Devices. Procedia Computer Science, Elsevier 32:1141–1146
Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference (DAC '15). ACM, New York
Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2017) Notes on the design and analysis of SIMON and SPECK. IACR Cryptology ePrint Archive 560
Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) S and S: Block Ciphers for the Internet of Things. IACR Cryptography ePrint Archive
Ciabattoni L, Freddi A, Longhi S, Monteriù A, Pepa L, Prist M (2016) An open and modular hardware node for wireless sensor and body area networks. Journal of Sensors
Daemen J, Rijmen V (1999) AES proposal: Rijndael
Dandekar AK, Pradhan S, Ghormade S (2016) Design of AES-512 algorithm for communication network. IRJET-International Research Journal of Engineering and Technology 3(5)
Dinu D, Corre YL, Khovratovich D, Perrin L, Großschädl J, Biryukov A (2015) Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 209
Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences 28(3):262–275
Elhoseny M, González GR, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608
Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable Computing
Elhoseny M, Yuan X, El-Minir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks 9(13):2024–2031
Farouk A, Batle J, Elhoseny M, Naseri M, Lone M, Fedorov A, Alkhambashi M, Ahmed SH, Abdel-Aty M (2018) Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front Phys 13(2):130306
Ghouti L, Ibrahim MK, Gutub AA (2013) Method of Performing Elliptic Polynomial Cryptography with Elliptic Polynomial Hopping. USPTO: United States Patents & Trademark Office, Patent number: US_8385541, Filing date: Feb 18, 2010, Patent Issue date: Feb 26
Gulcan E, Aysu A, Schaumont P (2014) A Flexible and Compact Hardware Architecture for The SIMON Block Cipher. Third International Workshop on Lightweight Cryptography for Security and Privacy: LightSec 2014, PP. 34–50. Istanbul
Gutub A (2003) High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran
Gutub A (2006) Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture. International Journal of Computer Science and Network Security (IJCSNS) 6(3A):44–52
Gutub A (2011) Subthreshold SRAM Designs for Cryptography Security Computations. In: ICSECS 2011 - 2nd International Conference on Software Engineering and Computer Systems, Universiti Malaysia Pahang, Kuantan
Gutub A (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh
Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal. Springer . https://doi.org/10.1007/s11042-017-5293-6ISSN 1380-7501
Gutub A, Khan E (2011) Using Subthreshold SRAM to Design Low-Power Crypto Hardware. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2):474–483
Gutub A, Khan F (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. In: International Conference on Advanced Computer Science Applications and Technologies – ACSAT2012, Palace of the Golden Horses, Kuala Lumpur
Gutub A, Tabakh AA, Al-Qahtani A, Amin A (2013) Serial vs. Parallel Elliptic Curve Crypto Processor Designs. In: IADIS International Conference: Applied Computing 2013, pp. 67–74, Fort Worth
Gutub A, Tahhan H (2008) Efficient Adders to Speedup Modular Multiplication For Cryptography. WoSPA 2008 – 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, UAE
Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services (SERVICES), PP. 21–28
Hosseinzadeh J, Hosseinzadeh M (2016) A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation. International Journal of Advances in Computer Science 5(4):31–41
Kölbl S, Leander G, Tiessen T (2015) Observations on the SIMON block cipher family. Annual Cryptology Conference, pp. 161–185, Springer
Kugler P, Nordhus P, Eskofier B (2013) Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Body Sensor Networks (BSN), IEEE International Conference on (pp. 1–6). IEEE
Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876–19897
Mora H, Gil D, Terol RM, Azorín J, Szymanski J (2017) An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments. Sensors 17(10):2302
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS 9(5):1938–1962
Nithya R, Kumar DS (2016) Where AES is for Internet, SIMON could be for IoT. Procedia Technology Journal 25:302–309
Parah S, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214–230
Parah S, Akhoon J, Sheikh J, Loan NA, Bhat GM (2015) A high capacity data hiding scheme based on edge detection and even-odd plane separation. Annual IEEE India Conference (INDICON), pp. 1–5
Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) Nonlinear Dynamics, A new secure and robust watermarking technique based on logistic map and modification of DC coefficient, In press
Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems, Internet of Things and Big Data Analytics Toward Next-Generation Intelligence, Edited book, pp. 409–437
Parah S, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E healthcare. Multimedia Tools and Applications 76(8):10599–10633 Springer
Parah SA, Sheikh JA, Bhat GM (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2018.02.023
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Shehab A, Ismail A, Osman L, Elhoseny M, El-Henawy IM (2017) Quantified Self Using IoT Wearable Devices. In International Conference on Advanced Intelligent Systems and Informatics. (pp. 820–831). Springer, Cham
Trad A, Bahattab A, Othman S (2014) Performance Trade-offs of Encryption Algorithms for Wireless Sensor Networks. IEEE World Congress on Computer Applications and Information Systems (WCCAIS), PP. 1–6
Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the Architecture of Internet of Things. IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 5:484–487
Yang G, Zhu B, Suder V, Aagaard MD, Gong G (2015) The Simeck Family of Lightweight Block Ciphers. CHES: International Workshop on Cryptographic Hardware and Embedded Systems, PP. 307–329, Springer
Zajac P (2017) Upper bounds on the complexity of algebraic crypt- analysis of ciphers with a low multiplicative complexity. Des Codes Crypt 82(1):43–56
Zhang W, Thurow K, Stoll R (2014) A knowledge-based telemonitoring platform for application in remote healthcare. International Journal of Computers Communications & Control 9(5):644–654
Acknowledgements
The authors acknowledge all support provided by Umm Al-Qura University (UQU) for encouraging this research work. Special thanks goes to the cooperation between the two UQU departments via Prof. Adnan Gutub from Computer Engineering and Dr Manal Al Ghamdi from Computer Sciences for motivating this research as well as building international collaboration with Dr Shabir Parah from the department of Electronics and IT, University of Kashmir, Srinagar, all working in collaboration on this wonderful research contributions.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alassaf, N., Gutub, A., Parah, S.A. et al. Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl 78, 32633–32657 (2019). https://doi.org/10.1007/s11042-018-6801-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6801-z