RF simulations for AAβ cryptosystem, an asymmetric encryption scheme

Published on Aug 1, 2018in Indonesian Journal of Electrical Engineering and Computer Science
· DOI :10.11591/ijeecs.v11.i2.pp542-548
Syed Farid Syed Adnan5
Estimated H-index: 5
Mohd Anuar Mat Isa6
Estimated H-index: 6
(UiTM: Universiti Teknologi MARA),
Habibah Hashim11
Estimated H-index: 11
Internet of Things (IoT) is a way of providing data with the physical thing that interconnected to the network, which is the Internet. The IoT devices connected to the internet, broadcast of the data to the broker or a server, becomes an open route for attackers to gain the data and making the data becomes vulnerable. Thus, the data could be altered or spoofed by an attacker which led to security issues especially on data integrity. Therefore, the data security collected from the sensors is as important as on the servers that eventually become the big data. However, most sensors are low powered devices in term of CPU, storage, memory and batteries that cryptographic algorithm computations might give overhead to the sensors and reduce the batteries even faster than it is supposed to be. Instead of looking at symmetric encryption scheme, this paper tries to explore the capabilities of the asymmetric scheme on resource constrained devices communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AAβ (AA-Beta) that promising to implement on the IoT devices to secure the IoT networks. The result shows only 14% size increased in ciphertext from plaintext and the RF simulation communications show a better result in Raspbian OS environment compare to windows environment even though with same configurations
  • References (0)
  • Citations (0)
📖 Papers frequently viewed together
4 Citations
9 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
Cited By0