M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru
{"title":"轻量级分组密码在物联网中的应用","authors":"M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru","doi":"10.1049/PBSE009E_CH7","DOIUrl":null,"url":null,"abstract":"This chapter aims to provide a comprehensive survey of lightweight block ciphers that have been designed for resource-constrained IoT platforms. The implementations of 10 lightweight block ciphers are compared on 8-bit, 16-bit, and 32-bit microcontrollers by using evaluation metrics such as power and energy consumption, latency, security level, throughput, and efficiency metrics. Furthermore, advantages and disadvantages of these ciphers are discussed. Finally, authentication problems and solutions for IoT devices are discussed in detail.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Lightweight block ciphers with applications in IoT\",\"authors\":\"M. K. Pehlivanoglu, M. T. Sakalli, S. Akleylek, N. Duru\",\"doi\":\"10.1049/PBSE009E_CH7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter aims to provide a comprehensive survey of lightweight block ciphers that have been designed for resource-constrained IoT platforms. The implementations of 10 lightweight block ciphers are compared on 8-bit, 16-bit, and 32-bit microcontrollers by using evaluation metrics such as power and energy consumption, latency, security level, throughput, and efficiency metrics. Furthermore, advantages and disadvantages of these ciphers are discussed. Finally, authentication problems and solutions for IoT devices are discussed in detail.\",\"PeriodicalId\":373543,\"journal\":{\"name\":\"Authentication Technologies for Cloud Computing, IoT and Big Data\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Authentication Technologies for Cloud Computing, IoT and Big Data\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/PBSE009E_CH7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Authentication Technologies for Cloud Computing, IoT and Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBSE009E_CH7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lightweight block ciphers with applications in IoT
This chapter aims to provide a comprehensive survey of lightweight block ciphers that have been designed for resource-constrained IoT platforms. The implementations of 10 lightweight block ciphers are compared on 8-bit, 16-bit, and 32-bit microcontrollers by using evaluation metrics such as power and energy consumption, latency, security level, throughput, and efficiency metrics. Furthermore, advantages and disadvantages of these ciphers are discussed. Finally, authentication problems and solutions for IoT devices are discussed in detail.