Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices

Authors

  • Damar Indrajati Universitas Amikom Yogyakarta
  • Wahid Miftahul Ashari Universitas Amikom Yogyakarta

DOI:

https://doi.org/10.30871/jaic.v9i3.9256

Keywords:

Internet of Things (IoT), Lightweight Encryption, Encryption Performance, Data Security, Power Efficiency

Abstract

Data security remains a major concern in the Internet of Things (IoT) landscape due to the inherent limitations in computational power, memory capacity, and energy availability of IoT devices. To address these challenges, lightweight encryption algorithms have emerged as alternatives to conventional cryptographic methods, aiming to balance performance and security. This study evaluates the effectiveness of five encryption algorithms—SIMON64/128, SPECK64/128, XTEA64/128, PRESENT64/128, and AES128—on IoT devices through experimental analysis of their security strength, execution time, CPU utilization, memory usage, and power efficiency. The experiments were conducted on a Raspberry Pi 3B+ using C-based implementations to emulate realistic IoT scenarios. The findings reveal that AES128 offers the strongest security characteristics, including the highest Avalanche Effect (39.29%) and Differential Resistance Score (6.76/10), but at the expense of significant resource consumption. In contrast, SIMON64/128 and SPECK64/128 deliver superior performance in terms of speed and resource efficiency, making them ideal for low-power environments, albeit with concerns about potential cryptographic backdoors. XTEA64/128 emerges as a practical compromise, delivering moderate security and low power consumption without known vulnerabilities. Based on these results, AES128 is suitable for high-capacity IoT platforms prioritizing strong encryption, while SIMON and SPECK are preferable for resource-constrained devices, with XTEA serving as a balanced alternative. This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.

Downloads

Download data is not yet available.

References

[1] K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi, and M. Mustaqim, "Internet of Things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios," IEEE Access, vol. 8, pp. 23022-23040, 2020.

[2] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, "SIT: a lightweight encryption algorithm for secure Internet of Things," arXiv preprint arXiv:1704.08688, 2017.

[3] L. Ertaul and A. Chauhan, "IoT Security: Implementation of XTEA, SIMON/SPECK Lightweight Block Ciphers," in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2023, pp. 2478-2485.

[4] S. Maitra, D. Richards, A. Abdelgawad, and K. Yelamarthi, "Performance evaluation of IoT encryption algorithms: Memory, timing, and energy," in 2019 IEEE Sensors Applications Symposium (SAS), 2019, pp. 1-6.

[5] H. Kwon, Y. B. Kim, S. C. Seo, and H. Seo, "High-speed implementation of PRESENT on AVR microcontroller," Mathematics, vol. 9, no. 4, p. 374, 2021.

[6] R. Bharathi and N. Parvatham, "Light-Weight PRESENT Block Cipher Model for IoT Security on FPGA," Intelligent Automation & Soft Computing, vol. 33, pp. 35-49, 2022.

[7] R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "SIMON and SPECK: Block ciphers for the Internet of Things," IACR Cryptol. ePrint Arch., p. 585, 2015.

[8] Y. Fatma, S. Soni, and M. Amseno, "Perbandingan algoritma SIMON dan SPECK dalam pengamanan citra digital," Jurnal CoSciTech (Computer Science and Information Technology), vol. 5, pp. 250-259, 2024.

[9] B. Y. Yustiarini, F. Dewanta, and H. H. Nuha, "A comparative method for securing Internet of Things (IoT) devices: AES vs. Simon-Speck encryptions," in 2022 1st International Conference on Information System & Information Technology (ICISIT), Yogyakarta, Indonesia, 2022, pp. 392-396, doi: 10.1109/ICISIT54091.2022.9872666.

[10] P. Panahi, C. Bayılmış, U. Çavuşoğlu, et al., "Performance evaluation of lightweight encryption algorithms for IoT-based applications," Arabian Journal for Science and Engineering, vol. 46, pp. 4015–4037, 2021. doi: 10.1007/s13369-021-05358-4.

[11] P. M. Ansyah, M. H. H. Ichsan, and A. Kusyanti, "Analisis performa algoritma SPECK pada Raspberry Pi," Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 1, pp. 1085–1092, 2018.

[12] V. Thakor, M. A. Razzaque, and M. Khandaker, "Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities," IEEE Access, vol. 9, pp. 28177-28193, 2021.

[13] P. Bright, "NSA-recommended IoT encryption algorithms are rubbish, says expert," The Register, Apr. 25, 2018. [Online]. Available: https://www.theregister.com/2018/04/25/nsa_iot_encryption/. [Diakses: Mar. 17, 2025].

[14] M. Appel, A. Bossert, S. Cooper, T. Kussmaul, J. L. Löffler, C. Pauer, and A. Wiesmaier, "Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared," Cryptology ePrint Archive, 2016.

[15] P. E. A. Adriaanse, "A comparative study of the TEA, XTEA, PRESENT and SIMON lightweight cryptographic schemes," Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, 2021.

[16] International Organization for Standardization, "ISO/IEC 29192-2:2012—Information security—Lightweight cryptography—Part 2: Block ciphers," 2012. Available: https://www.iso.org/standard/78477.html.

[17] I. Makarenko, S. Semushin, S. Suhai, S. M. Kazmi, A. Oracevic, and R. Hussain, "A comparative analysis of cryptographic algorithms in the Internet of Things," in 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA), 2020, pp. 1-8.

[18] P. S. Suryateja and K. V. Rao, "A survey on lightweight cryptographic algorithms in IoT," Cybernetics and Information Technologies, vol. 24, no. 1, pp. 21-34, 2024.

[19] N. M. Naser and J. R. Naif, "A systematic review of ultra-lightweight encryption algorithms," International Journal of Nonlinear Analysis and Applications, vol. 13, no. 1, pp. 3825-3851, 2022.

[20] Y. Y. Chan, C. Y. Khor, J. S. Teh, W. J. Teng, and N. Jamil, "Differential cryptanalysis of lightweight block ciphers SLIM and LCB," in Emerging Information Security and Applications. EISA 2022. Communications in Computer and Information Science, vol. 1641, J. Chen, D. He, and R. Lu, Eds. Cham, Switzerland: Springer, 2022. doi: 10.1007/978-3-031-23098-1_4.

[21] K. Mohamed, M. Nazran, F. Hani, and S. Ariffin, "Analyse on avalanche effect in cryptography algorithm," in Proceedings of the European Proceedings of Management and Science (EPMS), 2022. doi: 10.15405/epms.2022.10.57.

Downloads

Published

2025-06-03

How to Cite

[1]
D. Indrajati and W. M. Ashari, “Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices”, JAIC, vol. 9, no. 3, pp. 642–650, Jun. 2025.

Issue

Section

Articles

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.