Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Comparative Study on the Performance of Security Mechanisms in Internet of Things Devices

Version 1 : Received: 6 June 2023 / Approved: 7 June 2023 / Online: 7 June 2023 (09:37:29 CEST)

How to cite: José, M. A Comparative Study on the Performance of Security Mechanisms in Internet of Things Devices. Preprints 2023, 2023060529. https://doi.org/10.20944/preprints202306.0529.v1 José, M. A Comparative Study on the Performance of Security Mechanisms in Internet of Things Devices. Preprints 2023, 2023060529. https://doi.org/10.20944/preprints202306.0529.v1

Abstract

Data security is a fundamental aspect to be considered in Internet of Things (IoT) information gathering systems, as IoT is a network of interconnected devices that collect and share real-time data, becoming increasingly prevalent in our lives. However, data security in IoT systems presents unique challenges due to the large number of devices and access points involved. This study aims to conduct a literature review on IoT security to analyze the performance of security mechanisms on current development platforms, specifically on a Raspberry Pi 3. Some functions from the OpenSSL library were used, including popular hash functions and cipher algorithms. Additionally, a bash code was developed to obtain the time spent in seconds and the memory consumption in kilobytes. In addition to time and memory calculations, statistical values such as variance and standard deviation were also obtained and compared with results obtained on a personal computer. The tests conducted in this study demonstrated that it is possible to implement these algorithms on platforms with more limited resources, with AES and RSA algorithms being the most suitable for IoT scenarios.

Keywords

Internet of Things; Performance; Raspberry Pi; Security; Devices; OpenSSL; Hash functions; Tests.

Subject

Engineering, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.