JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Analysis of the Cryptographic Algorithms`s Performance on Various Devices Suitable for Underwater Communication
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Analysis of the Cryptographic Algorithms`s Performance on Various Devices Suitable for Underwater Communication
Yun, Chae-Won; Lee, Jae-Hoon; Yi, Okyeon; Shin, Su-Young; Park, Soo-Hyun;
  PDF(new window)
 Abstract
Recently, The interest about underwater acoustic communication is increase such as marine resources, disaster prevention, weather prediction, and so on. Because the underwater acoustic communication uses a water as media, the underwater acoustic communication has a lot of restrictions. Although the underwater acoustic communication is hard, it is important to consider the security. In this paper, we estimate the performance of cryptographic algorithms(AES, ARIA, and LEA) on a various devices, available in underwater acoustic communication, and analysis the results. This result will be provide effective data confidentiality for underwater communication.
 Keywords
Underwater Sensor Network;Underwater Acoustic Communication;Cryptographic Algorithm;Performance;
 Language
Korean
 Cited by
 References
1.
I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges," Ad Hoc Networks, Vol.3, No.3, pp.257-279, 2005. crossref(new window)

2.
Z. Jiang, "Underwater acoustic networks-issues and solutions," International Journal of Intelligent Control and Systems, Vol.13, No.3, pp.152-161, 2008.

3.
Nist Special Publication 800-57, Recommendation for Key Management-Part 1 : General, March, 2007 [Internet], http://csrc.nist.gov.

4.
J. Daemen and V. Rijmen, "The Design of Rijndael: AES-the Advanced Encryption Standard," Springer Science & Business Media, 2013.

5.
A. Biryukov, C. De Canniere, J. Lano, S. B. Ors, and B. Preneel, "Security and performance analysis of ARIA," Final Report, KU Leuven ESAT/SCD-COSIC, Vol.3, p.4, 2004.

6.
D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Applications, Springer International Publishing, pp.3-27, 2014.

7.
D. Hong, J. K. Lee, D. C. Kim, D. Kwon, K. H. Ryu, and D. G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Information Security Application, Springer International Publishing, pp.3-27, 2013.

8.
J. Yiu, "The definitive guide to the ARM Cortex-M3," Newnes, 2009.

9.
A. A. ATmega, 128L-8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash, Rev. 2467M-AVR-11/04.

10.
Intel Edison Platform [Internet], http://www.intel.com/content/www/us/en/do-it-yourself/edison.html.

11.
Arduino Platform [Internet], http://www.arduino.cc.

12.
Jin-Young Lee, Nam-Yeol Yun, and Soo-Hyun Park, "Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks," Journal of the Institute of Electronics and Information Engineers, Vol.51, No.4, pp.76-89, April, 2014.