Detailed Information

Cited 8 time in webofscience Cited 11 time in scopus
Metadata Downloads

Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications

Full metadata record
DC Field Value Language
dc.contributor.authorKhan, Safiullah-
dc.contributor.authorLee, Wai-Kong-
dc.contributor.authorHwang, Seong Oun-
dc.date.accessioned2021-07-19T02:40:52Z-
dc.date.available2021-07-19T02:40:52Z-
dc.date.created2021-02-01-
dc.date.issued2021-07-15-
dc.identifier.issn2327-4662-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81710-
dc.description.abstractInternet of Things (IoT) is a key enabling technology, wherein sensors are placed ubiquitously to collect and exchange information with their surrounding nodes. Due to the inherent inter-connectivity, IoT devices are vulnerable to cyber-security attacks. To mitigate these vulnerabilities, cryptographic primitives can be employed, but they require significant computation, which restricts their adoption in IoT. Moreover, IoT systems have diverse requirements, ranging from high-throughput to the area constrained. This makes it hard to deploy appropriate security measures in a systematic manner. To address these issues, three generic implementation strategies (unrolled, round-based, and serialized) are proposed for developing highly efficient hardware architectures. They are applicable to all authenticated encryption schemes, and are lightweight and fast, compared to conventional public key encryption. In this paper, Ascon is implemented as an example based on those three strategies. (1) The unrolled architecture achieves throughput (TP) of 766.9 Mbps (Ascon-128) and 1389.2 Mbps (Ascon-128a), which are suitable for high-throughput IoT applications. (2) The round-based architecture achieves 0.153 (Ascon-128) and 0.244 (Ascon-128a) throughput-to-area ratio, which are respectively 73.8% and 40.2% better than state-of-the-art results. (3) A novel serialized implementation technique is proposed wherein the substitution-box (S-box) is processed in multiple-bit-per-cycle, in contrast to the conventional one-bit-per-cycle approach. The throughput of the two-bits-per-clock-cycle implementation is increased by 230.8% with only 36.8% additional hardware area. The proposed strategies allow us to scale the number of rounds (round-based) and bits-per-clock-cycle (serialized) to meet differing requirements in throughput and area which are demonstrated for smart city IoT applications. IEEE-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.relation.isPartOfIEEE Internet of Things Journal-
dc.titleScalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000670585100021-
dc.identifier.doi10.1109/JIOT.2021.3052184-
dc.identifier.bibliographicCitationIEEE Internet of Things Journal, v.8, no.14, pp.11260 - 112785-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85099725313-
dc.citation.endPage112785-
dc.citation.startPage11260-
dc.citation.titleIEEE Internet of Things Journal-
dc.citation.volume8-
dc.citation.number14-
dc.contributor.affiliatedAuthorKhan, Safiullah-
dc.contributor.affiliatedAuthorLee, Wai-Kong-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.type.docTypeArticle in Press-
dc.subject.keywordAuthorAscon-
dc.subject.keywordAuthorAuthenticated Encryption-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorEncryption-
dc.subject.keywordAuthorField programmable gate arrays-
dc.subject.keywordAuthorFPGA-
dc.subject.keywordAuthorHardware-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorLightweight Cryptography-
dc.subject.keywordAuthorNIST.-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSmart cities-
dc.subject.keywordPlusArchitecture-
dc.subject.keywordPlusAuthentication-
dc.subject.keywordPlusClocks-
dc.subject.keywordPlusPublic key cryptography-
dc.subject.keywordPlusAuthenticated encryption-
dc.subject.keywordPlusAuthenticated encryption scheme-
dc.subject.keywordPlusCryptographic primitives-
dc.subject.keywordPlusEnabling technologies-
dc.subject.keywordPlusGeneric implementation-
dc.subject.keywordPlusImplementation techniques-
dc.subject.keywordPlusInternet of Things (IOT)-
dc.subject.keywordPlusSubstitution Box(S Box)-
dc.subject.keywordPlusInternet of things-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE