A Comparative Evaluation of Symmetric Cryptography Algorithms for Resource-Constrained Devices

Authors

DOI:

https://doi.org/10.5753/jisa.2025.4903

Keywords:

Arduino, Remote monitoring, Internet of Things, Symmetric cryptography

Abstract

Data security in the Internet of Things (IoT) is crucial for protecting both the devices and the data they transmit over the network. Nevertheless, security is often overlooked in this context, leaving systems vulnerable to cyberattacks that can compromise information confidentiality and integrity. This work focuses on a use case of an environment remote monitoring system for disaster prevention, in which information must be confidential and intact. The AES (Advanced Encryption Standard) and Speck cryptographic algorithm families are evaluated in both traditional and memory-optimized implementations, targeting data confidentiality. The algorithms are assessed through practical experiments on two resource-constrained hardware platforms. Transmission throughput, estimated energy consumption, execution time, and memory usage are evaluated. Results show that the Speck family executes more quickly, has lower estimated energy consumption, and occupies less memory space than AES in both platforms.

Downloads

Download data is not yet available.

References

Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16(1):11. Available online [link].

Albarello, R., Oyamada, M., and de Camargo, E. (2020). Evaluation of cryptographic algorithms and implementation of a lightweight protocol for communication between IoT devices. In Anais Estendidos do X Simpósio Brasileiro de Engenharia de Sistemas Computacionais, pages 65-72, Porto Alegre, RS, Brazil. SBC. ( In Portuguese). DOI: 10.5753/sbesc_estendido.2020.13092.

Alvalá, R. C. S. and Barbieri, A. F. (2017). Natural disasters. In Mudanças climáticas em rede: um olhar interdisciplinar, volume 1, pages 203-230. Canal6Editora. Available online [link].

Beg, A., Al-Kharobi, T., and Al-Nasser, A. (2019). Performance evaluation and review of lightweight cryptography in an internet-of-things environment. In 2nd International Conference on Computer Applications & Information Security (ICCAIS), pages 1-6. DOI: 10.1109/CAIS.2019.8769509.

Bogdanov, A., Khovratovich, D., and Rechberger, C. (2011). Biclique cryptanalysis of the full AES. In Lee, D. H. and Wang, X., editors, Advances in Cryptology - ASIACRYPT 2011, pages 344-371, Berlin, Heidelberg. Springer Berlin Heidelberg. DOI: 10.1007/978-3-642-25385-0_19.

de Paiva, B. D., de Souza, B. P., and Travassos, G. H. (2023). Cryptocomponent: a criptography component for low cost IoT software systems. In Anais Estendidos do XIV Congresso Brasileiro de Software: Teoria e Prática, pages 90-99. SBC. ( In Portuguese). DOI: 10.5753/cbsoft_estendido.2023.235935.

El-hajj, M., Mousawi, H., and Fadlallah, A. (2023). Analysis of lightweight cryptographic algorithms on IoT hardware platform. Future Internet, 15(2). DOI: 10.3390/fi15020054.

Fotovvat, A., Rahman, G. M. E., Vedaei, S. S., and Wahid, K. A. (2021). Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes. IEEE Internet of Things Journal, 8(10):8279-8290. DOI: 10.1109/JIOT.2020.3044526.

Guinelli, J. V., Aguiar, O. V., and Lazarin, N. M. (2018). Analysis and comparison of symmetric cryptographic algorithms embbedded into arduino platform. In Anais Estendidos do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, pages 167-176, Porto Alegre, RS, Brazil. SBC. ( In Portuguese). DOI: 10.5753/sbseg_estendido.2018.4153.

Hossein Motlagh, N., Mohammadrezaei, M., Hunt, J., and Zakeri, B. (2020). Internet of things (iot) and the energy sector. Energies, 13(2). DOI: 10.3390/en13020494.

Maitra, S., Richards, D., Abdelgawad, A., and Yelamarthi, K. (2019). Performance evaluation of iot encryption algorithms: Memory, timing, and energy. In 2019 IEEE Sensors Applications Symposium (SAS), pages 1-6. DOI: 10.1109/SAS.2019.8706017.

Mouha, R. A. and Ait, R. (2021). Internet of things (IoT). Journal of Data Analysis and Information Processing, 09(2):77–101. DOI: 10.4236/jdaip.2021.92006.

Munoz, P. S., Tran, N., Craig, B., Dezfouli, B., and Liu, Y. (2018). Analyzing the resource utilization of aes encryption on iot devices. In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pages 1200-1207. DOI: 10.23919/APSIPA.2018.8659779.

Panahi, P., Bayılmış, C., undefinedavuşoğlu, U., and Kaccar, S. (2021). Performance evaluation of lightweight encryption algorithms for IoT-based applications. Arabian Journal for Science and Engineering, 46(4):4015–4037. DOI: 10.1007/s13369-021-05358-4.

Pereira, G. C. C. F., Alves, R. C. A., Silva, F. L. d., Azevedo, R. M., Albertini, B. C., and Margi, C. B. (2017). Performance evaluation of cryptographic algorithms over IoT platforms and operating systems. Security and Communication Networks, 2017:1–16. DOI: 10.1155/2017/2046735.

Qasaimeh, M., Al-Qassas, R. S., and Ababneh, M. (2021). Software design and experimental evaluation of a reduced aes for iot applications. Future Internet, 13(11). DOI: 10.3390/fi13110273.

Sleem, L. and Couturier, R. (2020). Speck-r: An ultra light-weight cryptographic scheme for internet of things. Multimedia Tools and Applications, 80(11):17067–17102. DOI: 10.1007/s11042-020-09625-8.

Smith, R., Palin, D., Ioulianou, P. P., Vassilakis, V. G., and Shahandashti, S. F. (2020). Battery draining attacks against edge computing nodes in IoT networks. Cyber-Physical Systems, 6(2):96-116. DOI: 10.1080/23335777.2020.1716268.

Song, L., Huang, Z., and Yang, Q. (2016). Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. In Liu, J. K. and Steinfeld, R., editors, Information Security and Privacy, pages 379-394, Cham. Springer International Publishing. DOI: 10.1007/978-3-319-40367-0_24.

Tawalbeh, L., Muheidat, F., Tawalbeh, M., and Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences, 10(12). DOI: 10.3390/app10124102.

Vaz, Y., Mattos, J., and Soares, R. (2023). Optimized AES for use in IoT applications. In Anais Estendidos do XIII Simpósio Brasileiro de Engenharia de Sistemas Computacionais, pages 31-36, Porto Alegre, RS, Brazil. SBC. ( In Portuguese). DOI: 10.5753/sbesc_estendido.2023.235422.

Zanon, V., Romancini, E. M., Manoel, B., Lau, J., Ourique, F., and Morales, A. (2022). Experimental evaluation of a security layer implemented in a cardiac wearable device for the medical internet of things. In Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, pages 97-110, Porto Alegre, RS, Brazil. SBC. ( In Portuguese). DOI: 10.5753/sbseg.2022.224659.

Downloads

Published

2025-05-13

How to Cite

Ramalho, M., Sampaio, G., Neves, N., Porto, R., Sobral, V. A., Rezende, M., & Medeiros, D. S. V. (2025). A Comparative Evaluation of Symmetric Cryptography Algorithms for Resource-Constrained Devices. Journal of Internet Services and Applications, 16(1), 153–162. https://doi.org/10.5753/jisa.2025.4903

Issue

Section

Research article