Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices
DOI:
https://doi.org/10.30871/jaic.v9i3.9256Keywords:
Internet of Things (IoT), Lightweight Encryption, Encryption Performance, Data Security, Power EfficiencyAbstract
Data security remains a major concern in the Internet of Things (IoT) landscape due to the inherent limitations in computational power, memory capacity, and energy availability of IoT devices. To address these challenges, lightweight encryption algorithms have emerged as alternatives to conventional cryptographic methods, aiming to balance performance and security. This study evaluates the effectiveness of five encryption algorithms—SIMON64/128, SPECK64/128, XTEA64/128, PRESENT64/128, and AES128—on IoT devices through experimental analysis of their security strength, execution time, CPU utilization, memory usage, and power efficiency. The experiments were conducted on a Raspberry Pi 3B+ using C-based implementations to emulate realistic IoT scenarios. The findings reveal that AES128 offers the strongest security characteristics, including the highest Avalanche Effect (39.29%) and Differential Resistance Score (6.76/10), but at the expense of significant resource consumption. In contrast, SIMON64/128 and SPECK64/128 deliver superior performance in terms of speed and resource efficiency, making them ideal for low-power environments, albeit with concerns about potential cryptographic backdoors. XTEA64/128 emerges as a practical compromise, delivering moderate security and low power consumption without known vulnerabilities. Based on these results, AES128 is suitable for high-capacity IoT platforms prioritizing strong encryption, while SIMON and SPECK are preferable for resource-constrained devices, with XTEA serving as a balanced alternative. This research contributes a comparative framework to guide the selection of encryption algorithms for IoT systems, ensuring an optimal trade-off between security and operational efficiency.
Downloads
References
[1] K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi, and M. Mustaqim, "Internet of Things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios," IEEE Access, vol. 8, pp. 23022-23040, 2020.
[2] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, "SIT: a lightweight encryption algorithm for secure Internet of Things," arXiv preprint arXiv:1704.08688, 2017.
[3] L. Ertaul and A. Chauhan, "IoT Security: Implementation of XTEA, SIMON/SPECK Lightweight Block Ciphers," in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2023, pp. 2478-2485.
[4] S. Maitra, D. Richards, A. Abdelgawad, and K. Yelamarthi, "Performance evaluation of IoT encryption algorithms: Memory, timing, and energy," in 2019 IEEE Sensors Applications Symposium (SAS), 2019, pp. 1-6.
[5] H. Kwon, Y. B. Kim, S. C. Seo, and H. Seo, "High-speed implementation of PRESENT on AVR microcontroller," Mathematics, vol. 9, no. 4, p. 374, 2021.
[6] R. Bharathi and N. Parvatham, "Light-Weight PRESENT Block Cipher Model for IoT Security on FPGA," Intelligent Automation & Soft Computing, vol. 33, pp. 35-49, 2022.
[7] R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "SIMON and SPECK: Block ciphers for the Internet of Things," IACR Cryptol. ePrint Arch., p. 585, 2015.
[8] Y. Fatma, S. Soni, and M. Amseno, "Perbandingan algoritma SIMON dan SPECK dalam pengamanan citra digital," Jurnal CoSciTech (Computer Science and Information Technology), vol. 5, pp. 250-259, 2024.
[9] B. Y. Yustiarini, F. Dewanta, and H. H. Nuha, "A comparative method for securing Internet of Things (IoT) devices: AES vs. Simon-Speck encryptions," in 2022 1st International Conference on Information System & Information Technology (ICISIT), Yogyakarta, Indonesia, 2022, pp. 392-396, doi: 10.1109/ICISIT54091.2022.9872666.
[10] P. Panahi, C. Bayılmış, U. Çavuşoğlu, et al., "Performance evaluation of lightweight encryption algorithms for IoT-based applications," Arabian Journal for Science and Engineering, vol. 46, pp. 4015–4037, 2021. doi: 10.1007/s13369-021-05358-4.
[11] P. M. Ansyah, M. H. H. Ichsan, and A. Kusyanti, "Analisis performa algoritma SPECK pada Raspberry Pi," Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 1, pp. 1085–1092, 2018.
[12] V. Thakor, M. A. Razzaque, and M. Khandaker, "Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities," IEEE Access, vol. 9, pp. 28177-28193, 2021.
[13] P. Bright, "NSA-recommended IoT encryption algorithms are rubbish, says expert," The Register, Apr. 25, 2018. [Online]. Available: https://www.theregister.com/2018/04/25/nsa_iot_encryption/. [Diakses: Mar. 17, 2025].
[14] M. Appel, A. Bossert, S. Cooper, T. Kussmaul, J. L. Löffler, C. Pauer, and A. Wiesmaier, "Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared," Cryptology ePrint Archive, 2016.
[15] P. E. A. Adriaanse, "A comparative study of the TEA, XTEA, PRESENT and SIMON lightweight cryptographic schemes," Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, 2021.
[16] International Organization for Standardization, "ISO/IEC 29192-2:2012—Information security—Lightweight cryptography—Part 2: Block ciphers," 2012. Available: https://www.iso.org/standard/78477.html.
[17] I. Makarenko, S. Semushin, S. Suhai, S. M. Kazmi, A. Oracevic, and R. Hussain, "A comparative analysis of cryptographic algorithms in the Internet of Things," in 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA), 2020, pp. 1-8.
[18] P. S. Suryateja and K. V. Rao, "A survey on lightweight cryptographic algorithms in IoT," Cybernetics and Information Technologies, vol. 24, no. 1, pp. 21-34, 2024.
[19] N. M. Naser and J. R. Naif, "A systematic review of ultra-lightweight encryption algorithms," International Journal of Nonlinear Analysis and Applications, vol. 13, no. 1, pp. 3825-3851, 2022.
[20] Y. Y. Chan, C. Y. Khor, J. S. Teh, W. J. Teng, and N. Jamil, "Differential cryptanalysis of lightweight block ciphers SLIM and LCB," in Emerging Information Security and Applications. EISA 2022. Communications in Computer and Information Science, vol. 1641, J. Chen, D. He, and R. Lu, Eds. Cham, Switzerland: Springer, 2022. doi: 10.1007/978-3-031-23098-1_4.
[21] K. Mohamed, M. Nazran, F. Hani, and S. Ariffin, "Analyse on avalanche effect in cryptography algorithm," in Proceedings of the European Proceedings of Management and Science (EPMS), 2022. doi: 10.15405/epms.2022.10.57.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Damar Indrajati, Wahid Miftahul Ashari

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).