AES Data Encryption in a ZigBee network: Software or Hardware?



Similar documents
Implementation of Full -Parallelism AES Encryption and Decryption

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Evaluating The Performance of Symmetric Encryption Algorithms

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

ZigBee Technology Overview

A Non-beaconing ZigBee Network Implementation and Performance Study

An On-chip Security Monitoring Solution For System Clock For Low Cost Devices

Wireless Sensor Network: Challenges, Issues and Research

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

Keywords Web Service, security, DES, cryptography.

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Using IPv6 and 6LoWPAN for Home Automation Networks

CRIPT - Cryptography and Network Security

Demystifying Wireless for Real-World Measurement Applications

Cryptography and Key Management Basics

CSE 5392 Sensor Network Security

A Catechistic Method for Traffic Pattern Discovery in MANET

M.Tech. Software Systems

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

FPGA IMPLEMENTATION OF AN AES PROCESSOR

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

The new 32-bit MSP432 MCU platform from Texas

6LoWPAN Technical Overview

Implementation and Design of AES S-Box on FPGA

Sensor network infrastructure for intelligent building monitoring and management system

Home Automation and Cybercrime

Figure 1. The Example of ZigBee AODV Algorithm

Packet Level Authentication Overview

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

An Instruction Set Extension for Fast and Memory-Efficient AES Implementation

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Energy Efficiency of Wireless Sensor Networks

Multi-Person Pose Recognition Using a Zigbee Sensor Network

Current and Future Trends in Medical Electronics

An Energy Efficient ATM System Using AES Processor

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

Area Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption

Realizing Robust User Authentication in Sensor Networks

LoRa FAQs. 1 of 4 Semtech. Semtech Corporation LoRa FAQ

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

An Elliptic Curve based Hierarchical Cluster Key Management in Wireless Sensor Network

A Study of New Trends in Blowfish Algorithm

Remote Monitoring and Control System for DC Motor using Zigbee Protocol

The Internet of Things: Opportunities & Challenges

An Introduction to Digital Signature Schemes

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Some Security Trends over Wireless Sensor Networks

SOPC BASED WIRELESS REMOTE PATIENT MONITORING USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY

Study on Differential Protection of Transmission Line Using Wireless Communication

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Wireless Sensor Network for Electric Meter Handling

Fast Hash-Based Signatures on Constrained Devices

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Voice Transmission over Wireless Sensor Networks

Securing wireless sensor networks

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

SPINS: Security Protocols for Sensor Networks

Wireless Network Security Spring 2014

F21CN: Computer Network Security: Overview

The implementation and performance/cost/power analysis of the network security accelerator on SoC applications

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Radiocrafts Embedded Wireless Solutions

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Cloud Data Protection for the Masses

Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme

Triathlon of Lightweight Block Ciphers for the Internet of Things

A CDMA Based Scalable Hierarchical Architecture for Network- On-Chip

Zigbee Based Underground Mines Parameter Monitoring System for Rescue and Protection

Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring

Transcription:

AES Data Encryption in a ZigBee network: Software or Hardware? Geoffrey Ottoy Tom Hamelinckx, Bart Preneel, Lieven De Strycker and Jean-Pierre Goemaere KaHo Sint-Lieven association K.U.Leuven Belgium research groups: DraMCo / COSIC Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 1

Introduction Outline About the research groups Background information ZigBee Types of WSN Motivation Test setup Results Conclusions/future work Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 2

Introduction About the research groups DraMCo research group KaHo Sint-Lieven (+ 5000 students) Wireless and Mobile Communication www.dramco.be www.kahosl.be COSIC research group K.U. Leuven (35.000 students) Computer Security and Industrial Cryptography www.esat.kuleuven.be/cosic www.kuleuven.be Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 3

Some background information on ZigBee ZigBee security = key establishment, key transport, frame protection and device management Open trust model Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 4

Some background information on Types of WSN (applications) Centralized (e.g. fire detection) versus distributed (e.g. lighting) Combination is possible Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 5

Motivation What did we investigate and why? Properties of WSN (like ZigBee): low-data rate, robust, lowpower, unattended operation, low processing power, etc. ZigBee: AES 128 (CBC) for data encryption (confidentiality) Algorithm in hardware or software? Keeping this in mind Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 6

Motivation What did we investigate and why? Statement: Hardware is faster and (thus) more energyefficient than software. But will the use of hardware pay off in sensor networks? Test both approaches in a worst-case scenario. Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 7

Setup How did we test it? Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 8

Setup How did we test it? written in C optimized for 8-bit Atmel MCU 8 MHz f MCU Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 9

Setup How did we test it? VHDL Optimized for speed 1 round/clock cycle Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 10

Results What have we found? Measurement Software Hardware E send 2.01 mj 2.01 mj E recieve 343 µj 343 µj E enc 782 µj 0.1 µj E dec 949 µj < 0.2 µj data rate 2.0 kbps 2.1 kbps E tot 4.0 mj 3.2 mj Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 11

Results What can we conclude? Energy to send represents a large share of the total energy (TX power!) Hardware encryption = 20 % energy gain Measurement Software Hardware E send 2.01 mj 2.01 mj E recieve 343 µj 343 µj E enc 782 µj 0.1 µj E dec 949 µj < 0.2 µj data rate 2.0 kbps 2.1 kbps E tot 4.0 mj 3.2 mj Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 12

Finally Hardware or software? Depends on the application and network Transmission power relative share of encryption energy No influence on the data rate Implementing AES in software is feasible, but What about the future? Dedicated co-processor (ZC, storage and management) Large network with different types of nodes Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 13

Questions? Thank you for your attention Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 14

References 1. ZigBee Alliance: ZigBee Specification Document 053474r17. (2007) 2. A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography. CRC Press, ISBN: 0-8493-8523-7, p.230 (1996) 3. T. Zia, A. Zomaya: An Analysis of Programming and Simulations in Sensor Networks. School of Information Technologies, University of Sydney (2006) 4. M. Mathews, M. Song, S. Shetty, R. McKenzie: Detecting Compromised Nodes in Wireless Sensor Networks. Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (2007) 5. J.P. Kaps: Cryptography for Ultra-Low Power Devices. A Dissertation Submitted to the Faculty of the Worcester Polytechnic Institute (2006) 6. J. Daemen, V. Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard, Springer, 2002. 7. Federal Information Processing Standards Publication 197: Specification for the Advanced Encryption Standard (AES). (November 2001). 8. E. Shi, A. Perrig: Designing Secure Sensor Networks. In: IEEE Wireless Communications, pp 38 43 (December 2004) 9. G. Gaubatz, J.P. Kaps, E. Öztürk, B. Sunar: State of the Art in Ultra-Low Power Public Key Cryptography forwireless Sensor Networks. Cryptography Information Security Lab, Worcester Polytechnic, Institute (2005) 10. A. Hodjat, I. Verbauwhede: Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. IEEE Trans. Computers 55(4) pp 366 372 (2006) 11. S.J. Park: Analysis of AES Hardware Implementations. Department of Electrical and Computer Engineering, Oregon State University (2003) 12. S. Mangard, M. Aigner, S. Dominikus: A highly regular and scalable AES hardware architecture. In: IEEE Transactions on Computers, vol. 52 4, pp. 483 491 (April 2003) 13. A. Gielata, P. Russek, K. Wiatr: AES hardware implementation in FPGA for algorithm acceleration purpose. Proceedings of the International Conference on Signals and Electronic Systems, ICSES 08, pp. 137 140 (2008) 14. ZigBee Alliance, http://www.zigbee.org 15. IEEE Computer Society, IEEE Std 802.15.4-2006 (2006) 16. J. Sun, X. Zhang: Study of ZigBee Wireless Mesh Networks. Hybrid Intelligent Systems, International Conference on, IEEE Computer Society, pp 264 267 (2009) 17. V. Rijmen, N. Pramstaller: Cryptographic Algorithms in Constrained Environments (Chapter 6). In: Wireless Security and Cryptography, Edited by N. Skalvos, X. Zhang, CRC Press, ISBN: 978-0-8493-8771-5, pp. 186 195 (2007) 18. AES Lounge, http://www.iaik.tugraz.at/content/research/krypto/aes/iaik - TU Graz. 19. Atmel: ATmega640/1280/1281/2560/2561 [Datasheet] (2005) 20. Chipcon: CC2420 ZigBee-Ready Transceiver[Datasheet] (2003) Geoffrey Ottoy - AES Data Encryption in a ZigBee network: Software or Hardware? 15