{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:47:29Z","timestamp":1776444449445,"version":"3.51.2"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T00:00:00Z","timestamp":1683244800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T00:00:00Z","timestamp":1683244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007689","name":"Universidade de Aveiro","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100007689","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The advances on recent communication paradigms brings new security and privacy challenges, mainly about personal data collection by smart devices. Resource constrained devices face serious issues to run complex cryptographic algorithms. Trying to evaluate the performance impact of those algorithms in usual and common devices used in smart homes, in this paper we tested the impact of different cryptographic algorithms in low computational devices, typically used in smart devices applied in smart homes, testing different security configurations and using the two most used transport protocols (HTTP and MQTT). The experiment measures their effects on six commonly used embedded devices in IoT WSNs: ESP8622, ESP32, and Raspberry Pi (RPi) from 1 to 4. The experiment measured the power consumption, message delay, and additional message length (bytes). Moreover, the analysis was also used to model security algorithms. The experimental results from long runs (72 hours) reveal the cryptographic solution choice is significant for the message delay and additional message length.<\/jats:p>","DOI":"10.1007\/s10796-023-10383-9","type":"journal-article","created":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T10:02:16Z","timestamp":1683280936000},"page":"1243-1260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Analysis of the Cryptographic Algorithms in IoT Communications"],"prefix":"10.1007","volume":"26","author":[{"given":"Catarina","family":"Silva","sequence":"first","affiliation":[]},{"given":"Vitor A.","family":"Cunha","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o P.","family":"Barraca","sequence":"additional","affiliation":[]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,5]]},"reference":[{"issue":"21","key":"10383_CR1","doi-asserted-by":"publisher","first-page":"6131","DOI":"10.3390\/s20216131","volume":"20","author":"M Abu-Tair","year":"2020","unstructured":"Abu-Tair, M., Djahel, S., Perry, P., et al. (2020). Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors, 20(21), 6131.","journal-title":"Sensors"},{"issue":"8","key":"10383_CR2","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.3390\/s21082810","volume":"21","author":"AA Ahmed","year":"2021","unstructured":"Ahmed, A. A. (2021). Lightweight digital certificate management and efficacious symmetric cryptographic mechanism over industrial internet of things. Sensors, 21(8), 2810.","journal-title":"Sensors"},{"key":"10383_CR3","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.measurement.2018.07.067","volume":"129","author":"AH Alavi","year":"2018","unstructured":"Alavi, A. H., Jiao, P., Buttlar, W. G., et al. (2018). Internet of things-enabled smart cities: State-of-the-art and future trends. Measurement, 129, 589\u2013606.","journal-title":"Measurement"},{"key":"10383_CR4","doi-asserted-by":"crossref","unstructured":"AlHammadi, A., AlZaabi, A., AlMarzooqi, B., et al. (2019) Survey of iot-based smart home approaches. In: ASET, pp.\u00a01\u20136","DOI":"10.1109\/ICASET.2019.8714572"},{"key":"10383_CR5","first-page":"334","volume-title":"2013 International Conference on Computing","author":"S Bandyopadhyay","year":"2013","unstructured":"Bandyopadhyay, S., & Bhattacharyya, A. (2013). Lightweight internet protocols for web enablement of sensors using constrained gateway devices. 2013 International Conference on Computing (pp. 334\u2013340). IEEE: Networking and Communications (ICNC)."},{"key":"10383_CR6","unstructured":"Bernstein, D.J., et al. (2008) Chacha, a variant of salsa20. In: Workshop record of SASC, pp.\u00a03\u20135"},{"key":"10383_CR7","doi-asserted-by":"crossref","unstructured":"Chandel, S., Cao, W., Sun, Z., et al. (2019) A multi-dimensional adversary analysis of rsa and ecc in blockchain encryption. In: Future of information and communication conference. Springer, pp.\u00a0988\u20131003","DOI":"10.1007\/978-3-030-12385-7_67"},{"issue":"3","key":"10383_CR8","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11277-020-07134-3","volume":"112","author":"SS Dhanda","year":"2020","unstructured":"Dhanda, S. S., Singh, B., & Jindal, P. (2020). Lightweight cryptography: a solution to secure iot. Wireless Personal Communications, 112(3), 1947\u20131980.","journal-title":"Wireless Personal Communications"},{"key":"10383_CR9","doi-asserted-by":"publisher","first-page":"60,539","DOI":"10.1109\/ACCESS.2020.2983117","volume":"8","author":"A Diro","year":"2020","unstructured":"Diro, A., Reda, H., Chilamkurti, H., et al. (2020). Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication. IEEE Access, 8, 60,539-60,551.","journal-title":"IEEE Access"},{"key":"10383_CR10","unstructured":"Dworkin, M. J., Barker, E. B., Nechvatal, J. R., et al. (2001). Advanced encryption standard (AES). NIST Pubs: Tech. rep."},{"key":"10383_CR11","unstructured":"Farooq, U., Mushtaq, M., Bhatti, M. (2020) Efficient aes implementation for better resource usage and performance of iots. In: CYBER 2020"},{"issue":"10","key":"10383_CR12","doi-asserted-by":"publisher","first-page":"8279","DOI":"10.1109\/JIOT.2020.3044526","volume":"8","author":"A Fotovvat","year":"2020","unstructured":"Fotovvat, A., Rahman, G. M., Vedaei, S. S., et al. (2020). Comparative performance analysis of lightweight cryptography algorithms for iot sensor nodes. IEEE Internet of Things Journal, 8(10), 8279\u20138290.","journal-title":"IEEE Internet of Things Journal"},{"key":"10383_CR13","doi-asserted-by":"crossref","unstructured":"Ganesan, P., Venugopalan, R., Peddabachagari, P., et al. (2003) Analyzing and modeling encryption overhead for sensor network nodes. In: International conference on Wireless sensor networks and applications, pp.\u00a0151\u2013159","DOI":"10.1145\/941350.941372"},{"key":"10383_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, T.K., Sahula, V. (2016) Lightweight security algorithm for low power IoT devices. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE","DOI":"10.1109\/ICACCI.2016.7732296"},{"key":"10383_CR15","doi-asserted-by":"crossref","unstructured":"Hameed, A., Alomary, A. (2019) Security issues in iot: A survey. In: 3ICT, pp.\u00a01\u20135","DOI":"10.1109\/3ICT.2019.8910320"},{"key":"10383_CR16","doi-asserted-by":"publisher","unstructured":"Haque, M.E., Zobaed, S., Islam, M.U., et al. (2018) Performance analysis of cryptographic algorithms for selecting better utilization on resource constraint devices. In: 2018 21st International Conference of Computer and Information Technology (ICCIT), pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/ICCITECHN.2018.8631957","DOI":"10.1109\/ICCITECHN.2018.8631957"},{"issue":"8","key":"10383_CR17","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.3390\/s17081781","volume":"17","author":"H Jawad","year":"2017","unstructured":"Jawad, H., Nordin, R., Gharghan, S., et al. (2017). Energy-efficient wireless sensor networks for precision agriculture: a review. Sensors, 17(8), 1781.","journal-title":"Sensors"},{"key":"10383_CR18","doi-asserted-by":"crossref","unstructured":"Kamal, A., Dahshan, H., Rohiem, A. (2013) An elliptic curve threshold group signature scheme. In: International conference on aerospace sciences and aviation technology, pp.\u00a01\u20139","DOI":"10.21608\/asat.2013.22082"},{"key":"10383_CR19","doi-asserted-by":"crossref","unstructured":"Kocakulak, M., Butun, I. (2017) An overview of wireless sensor networks towards internet of things. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp.\u00a01\u20136","DOI":"10.1109\/CCWC.2017.7868374"},{"issue":"100","key":"10383_CR20","first-page":"364","volume":"40","author":"HK Kondaveeti","year":"2021","unstructured":"Kondaveeti, H. K., Kumaravelu, N. K., Vanambathina, S. D., et al. (2021). A systematic literature review on prototyping with arduino: applications, challenges, advantages, and limitations. Computer Science Review, 40(100), 364.","journal-title":"Computer Science Review"},{"key":"10383_CR21","doi-asserted-by":"crossref","unstructured":"Latif, R.M.A., Imran, L., Farhan, M., et al. (2019) Real-time simulation of iot based smart home live mirror using wsn. In: 2019 International conference on frontiers of information Technology (FIT), pp.\u00a049\u2013495","DOI":"10.1109\/FIT47737.2019.00019"},{"issue":"13","key":"10383_CR22","doi-asserted-by":"publisher","first-page":"265","DOI":"10.21105\/joss.00265","volume":"2","author":"RA Light","year":"2017","unstructured":"Light, R. A. (2017). Mosquitto: server and client implementation of the mqtt protocol. Journal of Open Source Software, 2(13), 265.","journal-title":"Journal of Open Source Software"},{"issue":"3","key":"10383_CR23","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s11277-020-07769-2","volume":"116","author":"S Majumder","year":"2021","unstructured":"Majumder, S., Ray, S., Sadhukhan, D., et al. (2021). Ecc-coap: Elliptic curve cryptography based constraint application protocol for internet of things. Wireless Personal Communications, 116(3), 1867\u20131896.","journal-title":"Wireless Personal Communications"},{"key":"10383_CR24","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, V.G., Gonz\u00e1lez-Manzano, L., Mu\u00f1oz, A.M. (2017) Secure elliptic curves in cryptography. In: Computer and network security essentials. Springer International Publishing, pp.\u00a0283\u2013298","DOI":"10.1007\/978-3-319-58424-9_16"},{"key":"10383_CR25","doi-asserted-by":"crossref","unstructured":"Mehibel, N., Hamadouche, M. (2017) A new approach of elliptic curve diffie-hellman key exchange. In: ICEE-B, pp.\u00a01\u20136","DOI":"10.1109\/ICEE-B.2017.8192159"},{"issue":"3","key":"10383_CR26","first-page":"162","volume":"27","author":"D Mendez Mena","year":"2018","unstructured":"Mendez Mena, D., Papapanagiotou, I., & Yang, B. (2018). Internet of things: survey on security. Information Security Journal: A Global Perspective, 27(3), 162\u2013182.","journal-title":"Information Security Journal: A Global Perspective"},{"key":"10383_CR27","doi-asserted-by":"crossref","unstructured":"Mohammedi, M., Omar, M., Zamouche, D., et al. (2021) Energy-aware key management and access control for the internet of things. World Wide Web, pp.\u00a01\u201332","DOI":"10.1007\/s11280-020-00861-4"},{"issue":"2","key":"10383_CR28","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1007\/s11276-020-02535-5","volume":"27","author":"SK Mousavi","year":"2021","unstructured":"Mousavi, S. K., Ghaffari, A., Besharat, S., et al. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), 1515\u20131555.","journal-title":"Wireless Networks"},{"key":"10383_CR29","doi-asserted-by":"crossref","unstructured":"Naik, N. (2017) Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In: 2017 IEEE International Systems Engineering Symposium (ISSE). IEEE","DOI":"10.1109\/SysEng.2017.8088251"},{"key":"10383_CR30","doi-asserted-by":"crossref","unstructured":"Nan, L.i. (2010) Research on diffie-hellman key exchange protocol. In: International conference on computer engineering and technology, pp.\u00a0V4\u2013634\u2013V4\u2013637","DOI":"10.1109\/ICCET.2010.5485276"},{"key":"10383_CR31","doi-asserted-by":"crossref","unstructured":"Riazi, M.S., Laine, K., Pelton, B., et al. (2020) Heax: an architecture for computing on encrypted data. In: Proceedings of the twenty-fifth international conference on architectural support for programming languages and operating systems, pp.\u00a01295\u20131309","DOI":"10.1145\/3373376.3378523"},{"key":"10383_CR32","doi-asserted-by":"crossref","unstructured":"Rosner, G., Kenneally, E. (2018) Clearly opaque: Privacy risks of the internet of things. In: Gilad, R., Erin, K. Clearly opaque: privacy risks of the internet of things (May 1, 2018). IoT Privacy Forum","DOI":"10.1109\/MIOT.2018.8717595"},{"key":"10383_CR33","doi-asserted-by":"crossref","unstructured":"Sadkhan, S.B., Salman, A.O. (2018) A survey on lightweight-cryptography status and future challenges. In: ICASEA, pp.\u00a0105\u2013108","DOI":"10.1109\/ICASEA.2018.8370965"},{"key":"10383_CR34","doi-asserted-by":"crossref","unstructured":"Sallam, S., Beheshti, B.D. (2018) A survey on lightweight cryptographic algorithms. In: TENCON, pp.\u00a01784\u20131789","DOI":"10.1109\/TENCON.2018.8650352"},{"issue":"19","key":"10383_CR35","doi-asserted-by":"publisher","first-page":"4312","DOI":"10.3390\/s19194312","volume":"19","author":"DAF Saraiva","year":"2019","unstructured":"Saraiva, D. A. F., Leithardt, V. R. Q., de Paula, D., et al. (2019). PRISEC: Comparison of symmetric key algorithms for IoT devices. Sensors, 19(19), 4312.","journal-title":"Sensors"},{"key":"10383_CR36","doi-asserted-by":"crossref","unstructured":"Shah, A., Engineer, M. (2019) A survey of lightweight cryptographic algorithms for iot-based applications. In: Smart innovations in communication and computational sciences. Springer, pp.\u00a0283\u2013293","DOI":"10.1007\/978-981-13-2414-7_27"},{"key":"10383_CR37","doi-asserted-by":"crossref","unstructured":"Silva, C., Barraca, J.P. (2022) Dynamic delegation-based privacy preserving in iot architectures. In: 2022 9th International Conference on Future Internet of Things and Cloud (FiCloud), IEEE, pp.\u00a046\u201354","DOI":"10.1109\/FiCloud57274.2022.00014"},{"key":"10383_CR38","doi-asserted-by":"crossref","unstructured":"Singh, S., Sharma, P.K., Moon, S.Y., et al. (2017) Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, pp.\u00a01\u201318","DOI":"10.1007\/s12652-017-0494-4"},{"key":"10383_CR39","unstructured":"Soni, D., Makwana, A. (2017) A survey on mqtt: a protocol of internet of things (iot). In: International conference on telecommunication, power analysis and computing techniques"},{"issue":"11","key":"10383_CR40","doi-asserted-by":"publisher","first-page":"3784","DOI":"10.3390\/s21113784","volume":"21","author":"C Stolojescu-Crisan","year":"2021","unstructured":"Stolojescu-Crisan, C., Crisan, C., & Butunoi, B. P. (2021). An iot-based smart home automation system. Sensors, 21(11), 3784.","journal-title":"Sensors"},{"key":"10383_CR41","doi-asserted-by":"crossref","unstructured":"Surendran, S., Nassef, A., Beheshti, B.D. (2018) A survey of cryptographic algorithms for iot devices. In: LISAT, pp.\u00a01\u20138","DOI":"10.1109\/LISAT.2018.8378034"},{"key":"10383_CR42","doi-asserted-by":"publisher","first-page":"28,177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"V.A Thakor","year":"2021","unstructured":"Thakor, V. .A., Razzaque, M. .A., & Khandaker, M. .R. .A. (2021). Lightweight cryptography algorithms for resource-constrained iot devices: A review, comparison and research opportunities. IEEE Access, 9, 28,177-28,193.","journal-title":"IEEE Access"},{"key":"10383_CR43","unstructured":"Thara, K.S. Vallala, P.G. (2020) A survey of encryption algorithms in IoT. 17th SC@ RUG 2019-2020, p.\u00a09"},{"issue":"6","key":"10383_CR44","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MCOM.2012.6211498","volume":"50","author":"S Tozlu","year":"2012","unstructured":"Tozlu, S., Senel, M., Mao, W., et al. (2012). Wi-fi enabled sensors for internet of things: a practical approach. IEEE Communications Magazine, 50(6), 134\u2013143.","journal-title":"IEEE Communications Magazine"},{"key":"10383_CR45","doi-asserted-by":"crossref","unstructured":"Zahoor, A., Kaur, S. (2021) A review of algorithms for secure data transmission in iot devices. In: Data driven approach towards disruptive technologies: proceedings of MIDAS 2020. Springer Singapore, pp.\u00a083\u201395","DOI":"10.1007\/978-981-15-9873-9_9"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10383-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-023-10383-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10383-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T08:05:14Z","timestamp":1725350714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-023-10383-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,5]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["10383"],"URL":"https:\/\/doi.org\/10.1007\/s10796-023-10383-9","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,5]]},"assertion":[{"value":"28 February 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}