Implementation of the Ascon authentication algorithm in IoT devices
This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST comp...
- Autores:
-
Cagua Bolívar, Gabriela
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2023
- Institución:
- Universidad de los Andes
- Repositorio:
- Séneca: repositorio Uniandes
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.uniandes.edu.co:1992/73793
- Acceso en línea:
- https://hdl.handle.net/1992/73793
- Palabra clave:
- IoT
Authentication
Encryption
Cybersecurity
Ingeniería
- Rights
- embargoedAccess
- License
- Attribution 4.0 International
id |
UNIANDES2_580a78d18893cab22be2c89ae43bda81 |
---|---|
oai_identifier_str |
oai:repositorio.uniandes.edu.co:1992/73793 |
network_acronym_str |
UNIANDES2 |
network_name_str |
Séneca: repositorio Uniandes |
repository_id_str |
|
dc.title.eng.fl_str_mv |
Implementation of the Ascon authentication algorithm in IoT devices |
title |
Implementation of the Ascon authentication algorithm in IoT devices |
spellingShingle |
Implementation of the Ascon authentication algorithm in IoT devices IoT Authentication Encryption Cybersecurity Ingeniería |
title_short |
Implementation of the Ascon authentication algorithm in IoT devices |
title_full |
Implementation of the Ascon authentication algorithm in IoT devices |
title_fullStr |
Implementation of the Ascon authentication algorithm in IoT devices |
title_full_unstemmed |
Implementation of the Ascon authentication algorithm in IoT devices |
title_sort |
Implementation of the Ascon authentication algorithm in IoT devices |
dc.creator.fl_str_mv |
Cagua Bolívar, Gabriela |
dc.contributor.advisor.none.fl_str_mv |
Lozano Garzón, Carlos Andrés Gauthier Umaña, Valerie Elisabeth |
dc.contributor.author.none.fl_str_mv |
Cagua Bolívar, Gabriela |
dc.contributor.researchgroup.none.fl_str_mv |
Facultad de Ingeniería |
dc.subject.keyword.eng.fl_str_mv |
IoT Authentication Encryption Cybersecurity |
topic |
IoT Authentication Encryption Cybersecurity Ingeniería |
dc.subject.themes.spa.fl_str_mv |
Ingeniería |
description |
This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST competition on lightweight encryption algorithms due to its robustness and level of protection. The implementation is conducted considering the constraints of the CupCarbon simulator, designed for simulating smart cities and sensor networks. Results obtained in terms of latency from the implementation are analyzed, focusing on response times and resource consumption. Similarly, the implementation of ASCON on Raspberry Pi devices in a context closer to real-world devices is performed. These devices serve as a validation platform to assess the feasibility of the encryption algorithm with limited resources. The analysis of this adaptation highlights its efficiency in IoT devices with constraints on computational capacity. The results obtained from both proposed implementations allow concluding on the viability of ASCON, confirming its ability to secure communications between IoT devices adapted to real-world needs. |
publishDate |
2023 |
dc.date.issued.none.fl_str_mv |
2023-12-15 |
dc.date.accessioned.none.fl_str_mv |
2024-02-02T13:29:01Z |
dc.date.accepted.none.fl_str_mv |
2024-02-01 |
dc.date.available.none.fl_str_mv |
2025-12-31 |
dc.type.none.fl_str_mv |
Trabajo de grado - Pregrado |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.content.none.fl_str_mv |
Text |
dc.type.redcol.none.fl_str_mv |
http://purl.org/redcol/resource_type/TP |
format |
http://purl.org/coar/resource_type/c_7a1f |
status_str |
acceptedVersion |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/1992/73793 |
dc.identifier.instname.none.fl_str_mv |
instname:Universidad de los Andes |
dc.identifier.reponame.none.fl_str_mv |
reponame:Repositorio Institucional Séneca |
dc.identifier.repourl.none.fl_str_mv |
repourl:https://repositorio.uniandes.edu.co/ |
url |
https://hdl.handle.net/1992/73793 |
identifier_str_mv |
instname:Universidad de los Andes reponame:Repositorio Institucional Séneca repourl:https://repositorio.uniandes.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.none.fl_str_mv |
Standards, National Institute of and Technology (2023). NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices. url: https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography algorithms-protect-small-devices (visited on 01/10/2024). all, IoT for (2020). 5 Worst IoT Hacking Vulnerabilities. url: https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities(visited on 01/10/2024). Jurcut, Anca et al. (2020). “Security considerations for Internet of Things: A survey”. In: SN Computer Science 1, pp. 1–19. Lopez-Pavon, Cristina, Sandra Sendra, and Juan F Valenzuela-Valdés (2018). “Eval uation of CupCarbon network simulator for wireless sensor networks”. In:Network Protocols and Algorithms 10.2, pp. 1–27. Sey, Dylan (2018). “A survey on authentication methods for the Internet of Things”. In: PeerJ Preprints 6, e26474v2. Yang, Yuchen et al. (2017). “A survey on security and privacy issues in Internet-of Things”. In: IEEE Internet of things Journal 4.5, pp. 1250–1258. Dobraunig, Christoph et al. (2016). “Ascon v1. 2”. In: Submission to the CAESAR Competition 5.6, p. 7. Company, McKinsey (2015). The Internet of Things: Mapping the Value Beyond the Hype. url: https://www.mckinsey.com/~/media/mckinsey/industries/technology%20media%20and%20telecommunications/high%20tech/our%20insights/the%20internet%20of%20things%20the%20value%20of%20digitizing%20the%20physical%20world/the-internet-of-things-mapping-the-value-beyond-the-hype.pdf (visited on 01/10/2024). Society, Internet (2015). El Internet de las cosas: una visión general. url: https://www.internetsociety.org/wp-content/uploads/2017/09/report InternetOfThings-20160817-es-1.pdf (visited on 01/10/2024). Mehdi, Kamal et al. (2014). “Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool”. In: Seventh International Conference on Simulation Tools and Techniques |
dc.rights.en.fl_str_mv |
Attribution 4.0 International |
dc.rights.uri.none.fl_str_mv |
http://creativecommons.org/licenses/by/4.0/ |
dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/embargoedAccess |
dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_f1cf |
rights_invalid_str_mv |
Attribution 4.0 International http://creativecommons.org/licenses/by/4.0/ http://purl.org/coar/access_right/c_f1cf |
eu_rights_str_mv |
embargoedAccess |
dc.format.extent.none.fl_str_mv |
43 páginas |
dc.format.mimetype.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Universidad de los Andes |
dc.publisher.program.none.fl_str_mv |
Ingeniería de Sistemas y Computación |
dc.publisher.faculty.none.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.department.none.fl_str_mv |
Departamento de Ingeniería Sistemas y Computación |
publisher.none.fl_str_mv |
Universidad de los Andes |
institution |
Universidad de los Andes |
bitstream.url.fl_str_mv |
https://repositorio.uniandes.edu.co/bitstreams/ddf3d133-890b-4e2f-b1e2-24417ea7764c/download https://repositorio.uniandes.edu.co/bitstreams/b48824d7-60ee-4253-94b3-5ed6616cae2e/download https://repositorio.uniandes.edu.co/bitstreams/709b23d0-e4d5-46c6-9997-9de44a544fce/download https://repositorio.uniandes.edu.co/bitstreams/bb5c385d-5f9c-4949-a45e-219fdaddc6b9/download https://repositorio.uniandes.edu.co/bitstreams/3fdce07f-9110-4edf-9711-1e36a4b5393d/download https://repositorio.uniandes.edu.co/bitstreams/7db2a978-57a9-4177-99f5-cc56f619b233/download https://repositorio.uniandes.edu.co/bitstreams/e0e6fb3f-0524-4b20-b3a4-2e71200c42eb/download https://repositorio.uniandes.edu.co/bitstreams/42e9c4f4-c23a-4cfa-b3d1-1d71bb51bfa0/download |
bitstream.checksum.fl_str_mv |
4b83d80be1095266539bf0abfb1bb62f a1f7b56762b29ffa086c650e383df349 0175ea4a2d4caec4bbcc37e300941108 ae9e573a68e7f92501b6913cc846c39f b729dee7d871350edfce2e2a67f3e197 0a5f525d9cd335cc192b0d907b6b70d6 7488a4aceb638b823b2732292a0b5307 9e31af6863da6a452d41f246a3810e6a |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio institucional Séneca |
repository.mail.fl_str_mv |
adminrepositorio@uniandes.edu.co |
_version_ |
1812133903895363584 |
spelling |
Lozano Garzón, Carlos AndrésGauthier Umaña, Valerie ElisabethCagua Bolívar, GabrielaFacultad de Ingeniería2024-02-02T13:29:01Z2025-12-312023-12-152024-02-01https://hdl.handle.net/1992/73793instname:Universidad de los Andesreponame:Repositorio Institucional Sénecarepourl:https://repositorio.uniandes.edu.co/This thesis addresses the implementation of Ascon, a lightweight encryption algorithm, on IoT devices. This algorithm emerges in response to the growing need to secure communications between these devices, given their processing and hardware constraints, and it emerged as the winner of the NIST competition on lightweight encryption algorithms due to its robustness and level of protection. The implementation is conducted considering the constraints of the CupCarbon simulator, designed for simulating smart cities and sensor networks. Results obtained in terms of latency from the implementation are analyzed, focusing on response times and resource consumption. Similarly, the implementation of ASCON on Raspberry Pi devices in a context closer to real-world devices is performed. These devices serve as a validation platform to assess the feasibility of the encryption algorithm with limited resources. The analysis of this adaptation highlights its efficiency in IoT devices with constraints on computational capacity. The results obtained from both proposed implementations allow concluding on the viability of ASCON, confirming its ability to secure communications between IoT devices adapted to real-world needs.Ingeniero de Sistemas y ComputaciónPregrado43 páginasapplication/pdfengUniversidad de los AndesIngeniería de Sistemas y ComputaciónFacultad de IngenieríaDepartamento de Ingeniería Sistemas y ComputaciónAttribution 4.0 Internationalhttp://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/embargoedAccesshttp://purl.org/coar/access_right/c_f1cfImplementation of the Ascon authentication algorithm in IoT devicesTrabajo de grado - Pregradoinfo:eu-repo/semantics/bachelorThesisinfo:eu-repo/semantics/acceptedVersionhttp://purl.org/coar/resource_type/c_7a1fTexthttp://purl.org/redcol/resource_type/TPIoTAuthenticationEncryptionCybersecurityIngenieríaStandards, National Institute of and Technology (2023). NIST Selects Lightweight Cryptography Algorithms to Protect Small Devices. url: https://www.nist.gov/news-events/news/2023/02/nist-selects-lightweight-cryptography algorithms-protect-small-devices (visited on 01/10/2024).all, IoT for (2020). 5 Worst IoT Hacking Vulnerabilities. url: https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities(visited on 01/10/2024).Jurcut, Anca et al. (2020). “Security considerations for Internet of Things: A survey”. In: SN Computer Science 1, pp. 1–19.Lopez-Pavon, Cristina, Sandra Sendra, and Juan F Valenzuela-Valdés (2018). “Eval uation of CupCarbon network simulator for wireless sensor networks”. In:Network Protocols and Algorithms 10.2, pp. 1–27.Sey, Dylan (2018). “A survey on authentication methods for the Internet of Things”. In: PeerJ Preprints 6, e26474v2.Yang, Yuchen et al. (2017). “A survey on security and privacy issues in Internet-of Things”. In: IEEE Internet of things Journal 4.5, pp. 1250–1258. Dobraunig, Christoph et al. (2016). “Ascon v1. 2”. In: Submission to the CAESAR Competition 5.6, p. 7.Company, McKinsey (2015). The Internet of Things: Mapping the Value Beyond the Hype. url: https://www.mckinsey.com/~/media/mckinsey/industries/technology%20media%20and%20telecommunications/high%20tech/our%20insights/the%20internet%20of%20things%20the%20value%20of%20digitizing%20the%20physical%20world/the-internet-of-things-mapping-the-value-beyond-the-hype.pdf (visited on 01/10/2024).Society, Internet (2015). El Internet de las cosas: una visión general. url: https://www.internetsociety.org/wp-content/uploads/2017/09/report InternetOfThings-20160817-es-1.pdf (visited on 01/10/2024).Mehdi, Kamal et al. (2014). “Cupcarbon: A multi-agent and discrete event wireless sensor network design and simulation tool”. In: Seventh International Conference on Simulation Tools and Techniques201812944PublicationORIGINALImplementation of the Ascon Authentication Algorithm in IoT Devices.pdfImplementation of the Ascon Authentication Algorithm in IoT Devices.pdfRestricción de acceso hasta el año 2026, se quiere subir el documento a alguna revista sin que de alto porcentaje de similitudapplication/pdf4027871https://repositorio.uniandes.edu.co/bitstreams/ddf3d133-890b-4e2f-b1e2-24417ea7764c/download4b83d80be1095266539bf0abfb1bb62fMD52autorizacion tesis - Gabriela Cagua.pdfautorizacion tesis - Gabriela Cagua.pdfHIDEapplication/pdf366629https://repositorio.uniandes.edu.co/bitstreams/b48824d7-60ee-4253-94b3-5ed6616cae2e/downloada1f7b56762b29ffa086c650e383df349MD53CC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8908https://repositorio.uniandes.edu.co/bitstreams/709b23d0-e4d5-46c6-9997-9de44a544fce/download0175ea4a2d4caec4bbcc37e300941108MD54LICENSElicense.txtlicense.txttext/plain; charset=utf-82535https://repositorio.uniandes.edu.co/bitstreams/bb5c385d-5f9c-4949-a45e-219fdaddc6b9/downloadae9e573a68e7f92501b6913cc846c39fMD55TEXTImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.txtImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.txtExtracted texttext/plain60232https://repositorio.uniandes.edu.co/bitstreams/3fdce07f-9110-4edf-9711-1e36a4b5393d/downloadb729dee7d871350edfce2e2a67f3e197MD56autorizacion tesis - Gabriela Cagua.pdf.txtautorizacion tesis - Gabriela Cagua.pdf.txtExtracted texttext/plain2056https://repositorio.uniandes.edu.co/bitstreams/7db2a978-57a9-4177-99f5-cc56f619b233/download0a5f525d9cd335cc192b0d907b6b70d6MD58THUMBNAILImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.jpgImplementation of the Ascon Authentication Algorithm in IoT Devices.pdf.jpgGenerated Thumbnailimage/jpeg6342https://repositorio.uniandes.edu.co/bitstreams/e0e6fb3f-0524-4b20-b3a4-2e71200c42eb/download7488a4aceb638b823b2732292a0b5307MD57autorizacion tesis - Gabriela Cagua.pdf.jpgautorizacion tesis - Gabriela Cagua.pdf.jpgGenerated Thumbnailimage/jpeg11140https://repositorio.uniandes.edu.co/bitstreams/42e9c4f4-c23a-4cfa-b3d1-1d71bb51bfa0/download9e31af6863da6a452d41f246a3810e6aMD591992/73793oai:repositorio.uniandes.edu.co:1992/737932024-02-16 14:51:47.634http://creativecommons.org/licenses/by/4.0/Attribution 4.0 Internationalembargohttps://repositorio.uniandes.edu.coRepositorio institucional Sénecaadminrepositorio@uniandes.edu.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 |