Advertisement

Wireless Personal Communications

, Volume 104, Issue 1, pp 471–489 | Cite as

Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission

  • Rafidah AhmadEmail author
  • Daniel Kho
  • Asrulnizam Abd. Manaf
  • Widad Ismail
Article
  • 49 Downloads

Abstract

Data security is currently become a serious concern in wireless communication system for both the users and providers. Without a secure medium, the data transmission is exposed to various types of wireless attacks. Therefore, this paper focuses on the development of a high performance parallel-pipelined-memory-based (P2M) Blowfish as a security design with reduced field programmable gate array (FPGA) utilization, which is the best security design to be embedded in the mobile devices. Through FPGA platform, the performance of the proposed Blowfish shows that a throughput increases by 10.5%, with the hardware utilization and power consumption decrease by 3.5% and 21%, respectively. The P2M Blowfish was validated in two-way communication channel by using FPGA-based radio platform together with ZigBee technology and the real-time transmission was measured in terms of bit-error-rate, received power and communication range. These characteristics have proven that the proposed P2M Blowfish possesses the ability to replace the advanced encryption standard which is known as a complex algorithm employed by most of the wireless communication standards.

Keywords

Power-throughput Blowfish Field programmable gate array ZigBee Bit-error-rate 

Notes

Acknowledgements

This research was financially supported by the Ministry of Science, Technology, and Innovation (MOSTI) ScienceFund Research Grant (Project No. 06-01-05-SF0640) and the Universiti Sains Malaysia Research University Grant for Individuals (RUI) (Project No. 1001/PELECT/814241).

References

  1. 1.
    Ahmad, R., Manaf, A. A., & Ismail, W. (2016). Implementation of a high-performance Blowfish for secure wireless communication. Journal of Telecommunication, Electronic and Computer Engineering, 8(6), 147–151.Google Scholar
  2. 2.
    Ahmad, R., & Ismail, W. (2013). A survey of high performance cryptography algorithms for WiMAX applications using SDR. In A. Al-Dulaimi, J. Cosmas, & A. Mohammed (Eds.), Self-organization and green applications in cognitive radio networks. Chapter 11 (pp. 231–246). Hershey: IGI-Global.CrossRefGoogle Scholar
  3. 3.
    Karthigaikumar, P., & Baskaran, K. (2010). Partially pipelined VLSI implementation of blowfish encryption/decryption algorithm. International Journal of Image and Graphics, 10(3), 327–341.MathSciNetCrossRefGoogle Scholar
  4. 4.
    Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.Google Scholar
  5. 5.
    Thakur, J., & Kumar, N. (2011). DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International Journal of Emerging Technology and Advanced Engineering, 1(2), 6–12.Google Scholar
  6. 6.
    Dakate, D. K., & Dubey, P. (2012). Performance comparison of symmetric data encryption techniques. International Journal of Advanced Research in Computer Engineering & Technology, 1(4), 163–166.Google Scholar
  7. 7.
    Kumar, A., & Karthikeyan, S. (2012). Investigating the efficiency of blowfish and rejindael (AES) algorithms. International Journal Computer Network and Information Security, 2, 22–28.CrossRefGoogle Scholar
  8. 8.
    Mandal, P. C. (2012). Superiority of blowfish algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), 196–201.Google Scholar
  9. 9.
    Haldankar, C., & Kuwelkar, S. (2014). Implementation of AES and blowfish algorithm. International Journal of Research in Engineering and Technology., 3(3), 143–146.Google Scholar
  10. 10.
    Harinath, D., Murthy, M. V. R., & Chitra, B. (2015). Cryptographic methods and performance analysis of data encryption algorithms in network security. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 680–688.Google Scholar
  11. 11.
    Schneier, B., & Whiting, D. (1997). Fast software encryption: Designing encryption for optimal speed on the Intel Pentium processor. In Proceedings of 4th international workshop on fast software encryption. LNCS (pp. 242–259). Berlin: Springer.Google Scholar
  12. 12.
    Ahmad, R., & Ismail, W. (2014). Implementation of high performance advanced encryption standard-128 for WiMAX application on FPGA. In Proceedings of the 2nd IEEE international symposium on telecommunication technologies (ISTT2014) (pp. 326–331), Langkawi.Google Scholar
  13. 13.
    Xilinx, Inc. (2015). Zynq-7000 all programmable SoC overview. Product Specification, DS190, v(1.8).Google Scholar
  14. 14.
    Digi International, Inc. (2015). XBee and XBee-PRO Zigbee: Embedded Zigbee modules provide OEMs with a simple way to integrate mesh technology into their application (pp. 1–3). Minnetonka: Digi International.Google Scholar
  15. 15.
    Mplemenos, G. G., Papadopoulos, K., & Papaefstathiou, I. (2010). Using reconfigurable hardware devices in WSNs for reducing the energy consumption of routing and security tasks. In Proceedings of IEEE global telecommunications conference (Globecom 2010) (pp. 1–5).Google Scholar
  16. 16.
    Arur, P. C., Chandrasekhar, M. S., Sreeram, S. S., Ramkishore, K., & Gopal, C. V. (2014). Secure data transmission using Blowfish algorithm. International Journal of Innovative Research in Science and Engineering, 2(5), 2347–3207.Google Scholar
  17. 17.
    Priyadharshini, S. P., Arumuagam, N., & Ananthamani, K. S. (2014). Implementation of security in wireless sensor network using blowfish algorithm. In Proceedings of International Conference on Innovations in Information, Embedded and Communication (pp. 33–37). ICIIECS.Google Scholar
  18. 18.
    Krishna, B. M., Varshini, J. S., Murthy, A. N., Santosh, N. A., Kumar, G. S. P., & Rao, B. S. V. (2015). RF module based wireless secured home automation system using FPGA. Journal of Theoretical and Applied Information Technology, 77(2), 273–279.Google Scholar
  19. 19.
    Kalaiarasi, D., & Prathipa, R. (2016). Zigbee based secured wireless transmission using advanced Blowfish cryptographic algorithm. Australian Journal of Basic and Applied Sciences, 10(1), 332–336.Google Scholar
  20. 20.
    Sudarshan, T. S. B., Mir, R. A., & Vijayalakshmi, S. (2005). DRIL-A flexible architecture for Blowfish algorithm encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 625–639). Berlin: Springer.Google Scholar
  21. 21.
    Chatterjee, S. R., Majumder, S., & Pramanik, B. (2014). FPGA implementation of pipelined blowfish algorithm. In Proceedings of 5th international symposium electronic system design (pp. 208–209).Google Scholar
  22. 22.
    Prasetyo, K. N., Purwanto, Y., & Darlis, D. (2014). An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In Proceedings of international conference on information and communication technology (ICoICT 2014) (pp. 75–79).Google Scholar
  23. 23.
    Bansal, V. P., & Jassal, P. S. (2016). Synthesis and analysis of 64-bit blowfish algorithm using VHDL. International Journal of Engineering Sciences, 17(1), 316–322.Google Scholar
  24. 24.
    Xilinx, Inc. (2012). Virtex6 family overview. Product specification, DS150, v2.4, USA.Google Scholar
  25. 25.
    Xilinx, Inc. (2012). ChipsScope Pro software and cores: User guide, UG029, v14.1, USA.Google Scholar
  26. 26.
    Elbirt, A. J., Yip, W. Chetwynd, B. & Paar, C. (2000). An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists. In Proceedings of the third advanced encryption standard candidate conference (pp. 13–27). New York: National Institute of Standards and Technology (NIST).Google Scholar
  27. 27.
    Dyken, J., & Delgado-Frias, J. G. (2010). FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm. Journal of Systems Architecture, 56, 116–123.CrossRefGoogle Scholar
  28. 28.
    Ahmad R., & Ismail W. (2016). Performance comparison of the improved power-throughput AES and Blowfish algorithms on FPGA. In Proceedings of the 9th international conference on robotics, vision, signal processing & power applications (ROVISP2016) (pp. 75–82), Penang.Google Scholar
  29. 29.
    Ahmad, R., & Ismail, W. (2016). Performance comparison of advanced encryption standard-128 algorithms for WiMAX application with improved power-throughput. Journal of Engineering Science and Technology (JESTEC), 11(12), 1–17.Google Scholar
  30. 30.
    Xilinx, Inc. (2011). Power methodology guide, UG786, v13.1 (pp. 8–9), USA.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Collaborative Microelectronic Design Excellence Centre (CEDEC), Engineering CampusUniversiti Sains MalaysiaNibong TebalMalaysia
  2. 2.Faculty of EngineeringMultimedia UniversityCyberjayaMalaysia
  3. 3.Auto-ID Laboratory, School of Electrical and Electronic Engineering, Engineering CampusUniversiti Sains MalaysiaNibong TebalMalaysia

Personalised recommendations