A QoS Analysis of SHA Algorithms for IoT Systems
Journal: International Journal of Emerging Trends in Engineering Research (IJETER) (Vol.12, No. 8)Publication Date: 2024--8-15
Authors : Zied Guitouni Eya Ben Brahim Mounir Zrigui Mohsen Machhout;
Page : 128-138
Keywords : Secure Hash Algorithms; IoT systems; Quality of Service; QoS parameters; resource-constrained devices; FPGA;
Abstract
Secure Hash Algorithms (SHA) are widely used in the Internet of Things (IoT) systems for message authentication and integrity verification. However, the performance of different SHA algorithms can vary significantly in terms of Quality of Service (QoS) metrics such as area utilization, processing speed, energy efficiency, and security. In this paper, we present a comprehensive analysis of the QoS parameters of various SHA algorithms and discuss the trade-offs between performance and security when selecting SHA algorithms for resource-constrained IoT devices. The study focuses on the hardware implementation of SHA algorithms in Field-Programmable Gate Array (FPGA) devices, which are commonly used in IoT applications. The performances and resource utilization of different SHA algorithms are compared and analyzed. The comparative results show that SHA-2 provide a good balance between performance and security, but SHA-3 provide better security due to its resistance to attacks such as length extension and collision
Other Latest Articles
- The Correlation between Java Programming and BSICT Graduate Attributes of Information Technology Students at Surigao del Norte State University
- Security Analysis of the BB84 Protocol in IoT Networks
- A Quantitative Analysis: Students Perception on Social Media among BSICT Students
- HYBRID CLOUD-EDGE ARCHITECTURES FOR AI-DRIVEN APPLICATIONS: OPPORTUNITIES AND CHALLENGES
- GAME THEORY AND STRATEGIC DECISION-MAKING: OPTIMIZING BUSINESS STRATEGIES IN THE AGE OF DIGITAL DISRUPTION
Last modified: 2024-08-18 01:15:16