Open Access Open Access  Restricted Access Subscription or Fee Access

FPGA Implementation of Cryptographic Algorithm for Internet of Things (IoT)

Divya Preethi G., Rajaram S., Sarojini M.

Abstract


Internet of Things (IoT) is an advanced version of internet where it is not just the mobile phones and computers that is connected to internet but also the other electronic objects that get connected to it. IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the internet via wireless and wired internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE. In this paper, a cryptographic method is put forth which makes use of MD5 and AES algorithm to attain security and privacy. Both these algorithms are simulated in Xilinx 14.2 tool using verilog HDL. Proposed method gives the chaining of the two algorithms to provide better security and privacy. On integrating these algorithms into an RFID tag, a secure means of communication can exist between surrounding things and thus making way for the acceptance of internet of things in society.  

Keywords: Internet of things, RFID, AES, MD5, confidentiality, integrity, VLSI

Cite this Article Divya Preethi G, Rajaram S, Sarojini M. FPGA Implementation of Cryptographic Algorithm for Internet of Things (IoT). Journal of Web Engineering & Technology. 2016; 3(2): 28–34p. 


Full Text:

PDF

References


Iker Mayorodomo, Peter Spies, Fritz Meir, et al. Emerging Technologies and Challenges for Internet of Things. IEEE Conference. 2011.

Jara Antonio J, Zamora Miguel A, Skarmeta Antonio FG. An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environment. IEEE CCNC, University of Murcia. 2010.

Bo Yan, Guangwen Huang. Supply Chain Information Transmission based on RFID and Internet of Things. ISECS International Colloquium on Computing, Communication, Control, and Management. 2009; 166–169p.

Chetan Sangwan, Chetan Bardwaj, Nisha, et al. VLSI Implementation of Advanced Encryption Standard. Second International Conference on Advanced Commuting and Communication Technologies. 2012; 412– 418p.

Rozita Borhan, Raja Mohd Fuad Tengku Aziz. Successful Implementation of AES Algorithm in Hardware. IEEE International Conference on Electronics Design, Systems and Application (ICEDSA). 2012; 27–32p.

Kimmo Jarvinen, Matti Tommiska, Jorma Skytta. Hardware Implementation Analysis of the MD5 Hash Algorithm. 38th Hawaii Conference on System Science. 2005; 1–10p.

Ted Phillips, Tom Karygiannis. Security Standards for the RFID Market. IEEE Computer Society. Nov–Dec 2005; 85– 89p.

Hui Suo, Jiafu Wan, Caifeng Zou, et al. Security in Internet of Things: A Review. International Conference on Computer Science and Electronics Engineering. 2012; 648–651p.

Ding C, Yang LJ, Wu M. Security Architecture and Key Technologies for IoT/CPS. ZTE Technology Journal. Feb 2011; 17(1).

Wan JF, Suo H, Yan HH, et al. A General Test Platform for Cyber-Physical Systems: Unmanned Vehicle with Wireless Sensor Network Navigation of IoT. In Proc of 2011 Int Conf on Advances in Engineering, Nanjing, China. Dec 2011.

Anand Kumar M, Khartikeyan S. Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms. Computer Network and Information Security. 2012; 22–28p.

David F. RFID Tags Security and the Individual. Computer Law & Security Report. 2006; 2(22): 165–168p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/