{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:03:33Z","timestamp":1771614213358,"version":"3.50.1"},"reference-count":54,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:00:00Z","timestamp":1570233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Junta Castilla y Le\u00f3n, Consejer\u00eda de Educaci\u00f3n and FEDER funds","award":["PLATAFORMA DE VEH\u00cdCULOS DE TRANSPORTE DE MATERIALES Y SEGUIMIENTO AUT\u00d3NOMO\u2014TARGET. 463AC03"],"award-info":[{"award-number":["PLATAFORMA DE VEH\u00cdCULOS DE TRANSPORTE DE MATERIALES Y SEGUIMIENTO AUT\u00d3NOMO\u2014TARGET. 463AC03"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices. The PRISEC module of the UbiPri middleware has this goal. In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. We verify that ChaCha20-Poly1305 is a very good option for resource constrained devices, along with the lightweight block ciphers SPECK128 and LEA.<\/jats:p>","DOI":"10.3390\/s19194312","type":"journal-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T03:34:01Z","timestamp":1570419241000},"page":"4312","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":79,"title":["PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1366-6365","authenticated-orcid":false,"given":"Daniel A. F.","family":"Saraiva","sequence":"first","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-601 Covilh\u00e3, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Delega\u00e7\u00e3o da Covilh\u00e3, 6201-601 Covilh\u00e3, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0446-9271","authenticated-orcid":false,"given":"Valderi Reis Quietinho","family":"Leithardt","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-601 Covilh\u00e3, Portugal"},{"name":"Laboratory of Embedded and Distributed Systems-LEDS, Universidade do Vale do Itaja\u00ed, Itaja\u00ed, SC 88302-901, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-1440","authenticated-orcid":false,"given":"Diandre","family":"de Paula","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-601 Covilh\u00e3, Portugal"}]},{"given":"Andr\u00e9","family":"Sales Mendes","sequence":"additional","affiliation":[{"name":"Computer and Automation Department, University of Salamanca, Plaza de la Merced s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6536-2251","authenticated-orcid":false,"given":"Gabriel Villarrubia","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[{"name":"Computer and Automation Department, University of Salamanca, Plaza de la Merced s\/n, 37008 Salamanca, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6824-6136","authenticated-orcid":false,"given":"Paul","family":"Crocker","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica, Universidade da Beira Interior, 6201-601 Covilh\u00e3, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Delega\u00e7\u00e3o da Covilh\u00e3, 6201-601 Covilh\u00e3, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Singh, S., and Singh, N. (2015, January 8\u201310). Internet of Things (IoT): Security challenges, business opportunities reference architecture for E-commerce. Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, India.","DOI":"10.1109\/ICGCIoT.2015.7380718"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"e20","DOI":"10.1002\/spy2.20","article-title":"Challenges of Securing Internet of Things Devices: A survey","volume":"1","author":"Samaila","year":"2018","journal-title":"Secur. Priv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Krishna, B.V.S., and Gnanasekaran, T. (2017, January 10\u201311). A systematic study of security issues in Internet-of-Things (IoT). Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058318"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Shin, H., Lee, H.K., Cha, H., Heo, S.W., and Kim, H. (2019, January 11\u201313). IoT Security Issues and Light Weight Block Cipher. Proceedings of the International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Okinawa, Japan.","DOI":"10.1109\/ICAIIC.2019.8669029"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","article-title":"Evaluating Critical Security Issues of the IoT World: Present and Future Challenges","volume":"5","author":"Frustaci","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Arvind, S., and Narayanan, V.A. (2019, January 15\u201316). An Overview of Security in CoAP: Attack and Analysis. Proceedings of the 5th International Conference on Advanced Computing Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS.2019.8728533"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and Privacy for Cloud-Based IoT: Challenges","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Liu, X., Deng, R., Choo, K.R., Yang, Y., and Pang, H. (2018). Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Trans. Dependable Secur. Comput., 1.","DOI":"10.1109\/TSC.2017.2773604"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1016\/j.future.2018.01.003","article-title":"Privacy-preserving fusion of IoT and big data for e-health","volume":"86","author":"Yang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","article-title":"Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system","volume":"479","author":"Yang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_12","first-page":"1","article-title":"IoT Middleware: A Survey on Issues and Enabling Technologies","volume":"4","author":"Ngu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"\u00d6zcan, A., Zizka, J., and Nagamalai, D. (2011). A Survey of Middleware for Internet of Things. Recent Trends in Wireless and Mobile Networks, Springer.","DOI":"10.1007\/978-3-642-21937-5"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"e114","DOI":"10.7717\/peerj-cs.114","article-title":"A security survey of middleware for the Internet of Things","volume":"3","author":"Fremantle","year":"2015","journal-title":"PeerJ Comput. Sci."},{"key":"ref_15","unstructured":"Leithardt, V. (2015). UbiPri: Middleware para Controle e Gerenciamento de Privacidade em Ambientes Ub\u00edquos. [Ph.D. Thesis, Universidade Federal do Rio Grande do Sul, Instituto de Inform\u00e1tica]. Available online: https:\/\/hdl.handle.net\/10183\/147774."},{"key":"ref_16","first-page":"1529","article-title":"A Privacy Taxonomy for the Management of Ubiquitous Environments","volume":"10","author":"Leithardt","year":"2013","journal-title":"J. Commun. Comput."},{"key":"ref_17","unstructured":"Leithardt, V., Correia, L.H.A., Borges, G., Rossetto, A., Rolim, C., Geyer, C., and Silva, J.M.S. (2017, January 25\u201329). UbiPri PRIPRO\u2014 Controle e Gerenciamento de Perfis de Usu\u00e1rios com Base na Privacidade de Dados. Proceedings of the 15a Escola Regional de Redes de Computadores (ERRC 2017), Santa Maria, Brazil."},{"key":"ref_18","unstructured":"Cesconetto, J., Silva, L.A., and Leithardt, V.R. (2019, January 10\u201312). Proposta de um Sistema para Controle e Gerenciamento de Perfis e Contexto de Usu\u00e1rios com base na Privacidade e Aplica\u00e7\u00f5es IoT. Proceedings of the XIX Escola Regional de Alto Desempenho da Regi\u00e3o Sul (ERAD 2019), Tr\u00eas de Maio, Brazil."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"11","DOI":"10.5383\/JUSPN.10.01.002","article-title":"Mechanism for Privacy Management Based on Data History (UbiPri-His)","volume":"10","author":"Leithardt","year":"2018","journal-title":"J. Ubiquitous Syst. Pervasive Netw."},{"key":"ref_20","unstructured":"Silva, L.A., Leithardt, V.R.Q., Dazzi, R.S., and Silva, J.S. (2018). PRISER\u2014Utiliza\u00e7\u00e3o de BLE para localiza\u00e7\u00e3o e notifica\u00e7\u00e3o com base na privacidade de dados. Rev. Eletron. Argent. Bras. Tecnol. Inf. Comun., 2."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Silva, L., Leithardt, V., Rolim, C., Gonz\u00e1lez, G., Geyer, C., and Silva, J. (2019). PRISER: Managing Notification in Multiples Devices with Data Privacy Support. Sensors, 19.","DOI":"10.3390\/s19143098"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lee, D.H., and Wang, X. (2011). Biclique Cryptanalysis of the Full AES. Advances in Cryptology\u2014ASIACRYPT 2011, Springer.","DOI":"10.1007\/978-3-642-25385-0"},{"key":"ref_23","unstructured":"Rivest, R.L., Robshaw, M., Sidney, R., and Yin, Y. (2019, August 28). The RC6TM Block Cipher. Available online: https:\/\/people.csail.mit.edu\/rivest\/pubs\/RRSY98.pdf."},{"key":"ref_24","unstructured":"Moriai, S., and Yin, Y. (2019, August 28). Cryptanalysis of Twofish (II). Available online: https:\/\/www.schneier.com\/twofish-analysis-shiho.pdf."},{"key":"ref_25","unstructured":"Liu, J.K., and Steinfeld, R. (2016). Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. Information Security and Privacy, Springer."},{"key":"ref_26","first-page":"999","article-title":"First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA","volume":"2014","author":"Kim","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Najm, Z., Jap, D., Jungk, B., Picek, S., and Bhasin, S. (2018, January 26\u201330). On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Chengdu, China.","DOI":"10.1109\/APCCAS.2018.8605653"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., and Leurent, G. (2016, January 24\u201328). On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201916), Vienna, Austria.","DOI":"10.1145\/2976749.2978423"},{"key":"ref_29","unstructured":"Pry, J.C., and Lomotey, R.K. (July, January 27). Energy Consumption Cost Analysis of Mobile Data Encryption and Decryption. Proceedings of the IEEE International Conference on Mobile Services (MS), San Francisco, CA, USA."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Abood, O.G., Elsadd, M.A., and Guirguis, S.K. (2017, January 19\u201321). Investigation of cryptography algorithms used for security and privacy protection in smart grid. Proceedings of the Nineteenth International Middle East Power Systems Conference (MEPCON), Cairo, Egypt.","DOI":"10.1109\/MEPCON.2017.8301249"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Panda, M. (2016, January 3\u20135). Performance analysis of encryption algorithms for security. Proceedings of the International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India.","DOI":"10.1109\/SCOPES.2016.7955835"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Vyakaranal, S., and Kengond, S. (2018, January 3\u20135). Performance Analysis of Symmetric Key Cryptographic Algorithms. Proceedings of the International Conference on Communication and Signal Processing (ICCSP), Chennai, India.","DOI":"10.1109\/ICCSP.2018.8524373"},{"key":"ref_33","unstructured":"Sibahee, M.A.A., Lu, S., Hussien, Z.A., Hussain, M.A., Mutlaq, K.A., and Abduljabbar, Z.A. (2017, January 21\u201323). The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN. Proceedings of the International Conference on Computing Intelligence and Information System (CIIS), Nanjing, China."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yung, M. (2002). (Not So) Random Shuffles of RC4. Advances in Cryptology\u2014CRYPTO 2002, Springer.","DOI":"10.1007\/3-540-45708-9"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Roy, B., and Meier, W. (2004). A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. Fast Software Encryption, Springer.","DOI":"10.1007\/b98177"},{"key":"ref_36","unstructured":"Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M., Suzaki, T., and Kawabata, T. (2019, July 27). The Most Efficient Distinguishing Attack on VMPC and RC4A. Available online: https:\/\/www.researchgate.net\/publication\/228914027_The_most_efficient_distinguishing_attack_on_VMPC_and_RC4A."},{"key":"ref_37","first-page":"70","article-title":"Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)","volume":"2007","author":"Maximov","year":"2007","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_38","unstructured":"Popov, A. (2019, July 26). Prohibiting RC4 Cipher Suites. Available online: https:\/\/tools.ietf.org\/html\/rfc7465."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Soewito, B., Gunawan, F.E., and Antonyov\u00e1, A. (2016, January 10\u201312). Power consumption for security on mobile devices. Proceedings of the 11th International Conference on Knowledge, Information and Creativity Support Systems (KICSS), Yogyakarta, Indonesia.","DOI":"10.1109\/KICSS.2016.7951435"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Och\u00f4a, I.S., Leithardt, V.R.Q., Zeferino, C.A., and Silva, J.S. (2018, January 12\u201314). Data Transmission Performance Analysis with Smart Grid Protocol and Cryptography Algorithms. Proceedings of the 13th IEEE International Conference on Industry Applications (INDUSCON), S\u00e3o Paulo, Brazil.","DOI":"10.1109\/INDUSCON.2018.8627195"},{"key":"ref_41","unstructured":"Da Silva, B.A., Och\u00f4a, I.S., and Leithardt, V. (2019, July 27). Estudo de Algoritmos Criptogr\u00e1ficos Sim\u00e9tricos na Placa Beaglebone Black. Available online: https:\/\/www.setrem.com.br\/erad2019\/data\/pdf\/forum_ic\/192077.pdf."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Yilmaz, B., and \u00d6zdem\u0130r, S. (2018, January 2\u20135). Performance comparison of cryptographic algorithms in internet of things. Proceedings of the 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey.","DOI":"10.1109\/SIU.2018.8404524"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"De Santis, F., Schauer, A., and Sigl, G. (2017, January 27\u201331). ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications. Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE), Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927078"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Alrowaithy, M., and Thomas, N. (2019, January 12\u201315). Investigating the Performance of C and C++ Cryptographic Libraries. Proceedings of the 12th EAI International Conference on Performance Evaluation Methodologies and Tools, Palma, Spain.","DOI":"10.1145\/3306309.3306335"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Surendran, S., Nassef, A., and Beheshti, B.D. (2018, January 4). A survey of cryptographic algorithms for IoT devices. Proceedings of the IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA.","DOI":"10.1109\/LISAT.2018.8378034"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Khan, N., Sakib, N., Jerin, I., Quader, S., and Chakrabarty, A. (2017, January 21\u201323). Performance analysis of security algorithms for IoT devices. Proceedings of the IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Dhaka, Bangladesh.","DOI":"10.1109\/R10-HTC.2017.8288923"},{"key":"ref_47","unstructured":"Saraiva, D., Leithardt, V., and Crocker, P. (2019, January 5\u20136). Comparison and use of cryptography algorithms for ubiquitous computing. Proceedings of the INForum, Simp\u00f3sio de Inform\u00e1tica, Guimar\u00e3es, Portugal."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"3564","DOI":"10.1002\/sec.1281","article-title":"Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller","volume":"8","author":"Cazorla","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","article-title":"Triathlon of lightweight block ciphers for the Internet of things","volume":"9","author":"Dinu","year":"2018","journal-title":"J. Cryptogr. Eng."},{"key":"ref_50","unstructured":"Cazorla, M., Marquet, K., and Minier, M. (2013, January 29\u201331). Survey and benchmark of lightweight block ciphers for wireless sensor networks. Proceedings of the International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland."},{"key":"ref_51","unstructured":"Appel, M., Bossert, A., Cooper, S., Kussmaul, T., L\u00f6ffler, J.D., Pauer, C., and Wiesmaier, A. (2019, July 23). Block ciphers for the IoT\u2014SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA Compared. Available online: https:\/\/www.semanticscholar.org\/paper\/bc77d9dd70bacd6da036445cb6a78fea67b3b5dd."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","article-title":"A review of lightweight block ciphers","volume":"8","author":"Hatzivasilis","year":"2018","journal-title":"J. Cryptogr. Eng."},{"key":"ref_53","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., and Schl\u00e4ffer, M. (2019, July 30). Ascon v1.2: Submission to the CAESAR Competition. Available online: https:\/\/competitions.cr.yp.to\/round3\/asconv12.pdf."},{"key":"ref_54","unstructured":"Wu, H. (2019, July 30). ACORN: A Lightweight Authenticated Cipher (v3). Available online: https:\/\/competitions.cr.yp.to\/round3\/acornv3.pdf."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/19\/4312\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:27:44Z","timestamp":1760189264000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/19\/4312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,5]]},"references-count":54,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2019,10]]}},"alternative-id":["s19194312"],"URL":"https:\/\/doi.org\/10.3390\/s19194312","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,5]]}}}