ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A QoS Analysis of SHA Algorithms for IoT Systems

Journal: International Journal of Emerging Trends in Engineering Research (IJETER) (Vol.12, No. 8)

Publication Date:

Authors : ;

Page : 128-138

Keywords : Secure Hash Algorithms; IoT systems; Quality of Service; QoS parameters; resource-constrained devices; FPGA;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Secure Hash Algorithms (SHA) are widely used in the Internet of Things (IoT) systems for message authentication and integrity verification. However, the performance of different SHA algorithms can vary significantly in terms of Quality of Service (QoS) metrics such as area utilization, processing speed, energy efficiency, and security. In this paper, we present a comprehensive analysis of the QoS parameters of various SHA algorithms and discuss the trade-offs between performance and security when selecting SHA algorithms for resource-constrained IoT devices. The study focuses on the hardware implementation of SHA algorithms in Field-Programmable Gate Array (FPGA) devices, which are commonly used in IoT applications. The performances and resource utilization of different SHA algorithms are compared and analyzed. The comparative results show that SHA-2 provide a good balance between performance and security, but SHA-3 provide better security due to its resistance to attacks such as length extension and collision

Last modified: 2024-08-18 01:15:16