Advanced Encryption Standard (AES) pada Modul Internet of Things (IoT)

Royyannuur Kurniawan Endrayanto, Adharul Muttaqin, Raden Arief Setyawan

Sari


Pada modul IoT yang memerlukan enkripsi data tetapi tidak dilengkapi dengan hardware accelerator khusus untuk enkripsi, perlu menggantikan hardware tersebut dalam bentuk program. Akan tetapi penambahan program enkripsi diketahui dapat menimbulkan permasalahan pada modul IoT berbasis embedded system yang memiliki sumber daya terbatas. Dalam kajian ini dibahas algoritma enkripsi AES-128 yang diimplementasikan pada modul IoT Particle Photon yang belum memiliki hardware accelarator. Tujuan yang hendak dicapai adalah untuk mengetahui pengaruh dari penerapan AES-128 pada modul IoT. Hasil pengujian menunjukkan AES-128 yang diterapkan dapat berjalan baik dengan waktu enkripsi paling lama 398 mikrodetik dan throughput terkecil 301507,538 bit/detik. Hasil pengukuran beban terhadap penerapan enkripsi berupa penggunaan memori flash oleh program sebesar 16.024 Byte dengan penggunaan RAM sebesar 3.020 Byte.

Kata Kunci


Modul IoT; Sniffing; AES-128

Teks Lengkap:

PDF


Dilihat:
Sari 3382 kali
PDF 1701 kali

Referensi


Wei, Z., et al., “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved,” IEEE Paper Manuscript, 2018, pp. 1-11.

Vashi, S. et al, “Internet of Things (IoT) - A Vision, Architectural Elements, and Security Issues,” IEEE, 2017.

Ukil, A., Sen, J., Koilakonda, S, “Embedded Security for Internet of Things,”. IoT Security Laboratory, Kolkata. 2014.

Carroll, E. et al., “McAfee Labs 2019 Threats Predictions Report,” [Online] Available: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-2019-threats-predictions/ [Diakses 10 Agustus 2019].

Razzaq, M. A., Qureshi, M. A., Gill, S. H. & Ullah, S., “Security Issues in the Internet of Things (IoT): A Comprehensive Study” (IJACSA) International Journal of Advanced Computer Science and Applications, 8(6), pp. 383-388, 2017.

Leveugle, R., Mkhinini, A. & Maistri, P., 2018. Hardware Support for Security in the Internet of Things: From Lightweight Countermeasures to Accelerated Homomorphic Encryption. MDPI Journal Information, 9(114), pp. 1-15.

Noura, B., et al., “A compact 32-Bit AES design for embedded system”, IEEE, 2012.

Tsai, K., et al, “AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments,” Special Section on Security and Trusted Computing for Indutrial Internet of Things, pp. 45325-45333.

Raju, B., et al., “Implementation of an Efficient Dynamic AES”, IEEE, 2017, pp. 39-43.

Daemen, J. dan Rijmen, V. “The Design of Rijndael AES - The Advanced Encryption Standard”, Springer, Berlin, 2001.

Wardhani, R. W., Ogi, D., Syahral, M. & Catur, D. S., 2017. Fast Implementation of AES in Cortex-M3 for Security Information Devices, Bogor: IEEE.

Arrag, S., Hamdoun, A., Tragha, A. & Khamlich, S., “Design and Implementation A different Architectures of mixcolumn in FPGA”, International Journal of VLSI Design & Communication Systems, Vol. 3, 2012.

Kak, A., “Lecture 8: AES: The Advanced Encryption Standard - Lecture Notes on “Computer and Network Security,” [Online], Available: https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf [diakses 17 Mei 2019].

Blazhevski, D., “Modes of Operation of The AES Algorithm. Faculty of Computer Science and Engineering”, Skopje, Macedonia, pp. 212-216, 2013.

Dworkin, M., “Recommendation for Block Cipher Modes of Operation”, National Institute of Standards and Technology (NIST), 2001.

Echeverri, C., “Visualization of the Avalanche” Faculty for Business Informatics & Business Mathematics, University of Mannheim, Mannheim, 2017.

Moreno, C. & Fischmeister, S., 2017. Accurate Measurement of Small Execution Times – Getting Around Measurement Errors, Waterloo: University of Waterloo.

Elminaam, D. S. A., Kader, H. M. A. & Hadhoud, M. M., 2010. “Evaluating The Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, 10(3), pp. 213-219.




DOI: https://doi.org/10.15575/telka.v5n2.103-113

Refbacks

  • Saat ini tidak ada refbacks.


Jurnal TELKA terindex oleh :


     moraref logo       Crossref logo        sinta logo     base logo


Onesearch logo     IPI logo      Dimensions logo




Didukung oleh :







Lisensi Creative Commons
Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi-NonKomersial-BerbagiSerupa 4.0 Internasional.