Article Open Access

Lightweight Cryptography for IoT in Wireless Sensor Networks: Evaluating Speck, Simon, and Ascon Using NS-3

(1) Bayu Widodo Mail (IPB Vocational School, Bogor, 16128, Indonesia)
(2) Mohammad Fazrie Mail (Universitas Indraprasta PGRI, Jakarta, 12530, Indonesia)
(3) * Dudi Parulian Mail (Universitas Indraprasta PGRI, Jakarta, 12530, Indonesia)
*Corresponding author

Abstract


Communication security in Wireless Sensor Networks (WSNs) is a significant challenge in the implementation of the Internet of Things (IoT), particularly in smart city applications which have limitations in energy, memory, and computation. Conventional cryptographic algorithms are generally not suitable for IoT devices due to their complexity and high resource requirements, necessitating lightweight cryptography (LWC) algorithms that can balance security and efficiency. This research evaluates three lightweight encryption algorithms - Speck, Simon, and Ascon - using NS-3 simulations in a multi-hop network scenario with 30 nodes. The parameters analyzed include energy consumption, encryption/decryption time, and communication overhead. The simulation results show a significant trade-off: Speck and Simon excel in energy efficiency and low latency, but their security level is moderate; while Ascon provides stronger security according to NIST LWC standards, but with the consequence of higher energy consumption. The main contribution of this research is the provision of a reproducible NS-3 simulation-based framework that can link security and energy efficiency aspects, while also filling the literature gap, which is still limited to hardware testing. This finding is expected to serve as a practical reference for IoT system designers in determining the appropriate encryption algorithm for smart city application needs, and to open up opportunities for further research on real IoT devices.

Keywords


Internet of Things; Wireless Sensor Network; Lightweight Cryptography; Speck; Simon; Ascon; NS-3; Smart City

   

DOI

https://doi.org/10.33122/ejeset.v6i2.1161
      

Article metrics

Abstract views : 73

   

Cite

   

References


Adday, Hassan, G., Subramaniam, S. K., Zukarnain, Z. A., & Samian, N. (2024). Investigating and analyzing simulation tools of wireless sensor networks: A comprehensive survey. IEEE Access, 12, 22938–22977.

Altowaijri, S. M. (2022). Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks. Future Internet, 14(2), 1–16. https://doi.org/10.3390/fi14020035

Anastasi, G., Conti, M., Francesco, D. M., & Neri, V. (2010). Reliability and energy efficiency in multi-hop IEEE 802.15.4/ZigBee Wireless Sensor Networks. Proceedings - IEEE Symposium on Computers and Communications, 336–341. https://doi.org/10.1109/ISCC.2010.5546804

Bakhsh, S. T. (2017). Energy-efficient distributed relay selection in wireless sensor network for Internet of Things. In 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC, 1802–1807. https://doi.org/10.1109/IWCMC.2017.7986557

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2014). The simon and speck block ciphers on avr 8-bit microcontrollers. In International Workshop on Lightweight Cryptography for Security and Privacy, 8898, 3–20. https://doi.org/10.1007/978-3-319-16363-5_1

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2015). Simon and Speck: Block Ciphers for the Internet of Things. Cryptology EPrint Archive, 1–15.

Belli, L., Cilfone, A., Davoli, L., Ferrari, G., Adorni, P., Di Nocera, F., Dall’olio, A., Pellegrini, C., Mordacci, M., & Bertolotti, E. (2020). IoT-enabled smart sustainable cities: Challenges and approaches. Smart Cities, 3(3), 1039–1071. https://doi.org/10.3390/smartcities3030052

Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., & Mastroianni, M. (2020). Computer network simulation with ns-3: A systematic literature review. Electronics, 9(2), 1–25. https://doi.org/10.3390/electronics9020272

Dobraunig, C., Eichlseder, M., Mendel, F., & Schläffer, M. (2021). Ascon v1.2: Lightweight Authenticated Encryption and Hashing. Journal of Cryptology, 34(3), 1–42. https://doi.org/10.1007/s00145-021-09398-9

El-hajj, M., Mousawi, H., & Fadlallah, A. (2023). Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet, 15(2), 1–29. https://doi.org/10.3390/fi15020054

Gulati, K., Boddu, R. S. K., Kapila, D., Bangare, S. L., Chandnani, N., & Saravanan, G. (2021). A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 51, 161–165. https://doi.org/10.1016/j.matpr.2021.05.067

Hoang, T. Van. (2024). Impact of Artificial Intelligence and Internet of Things Technologies on Smart Cities and Urban Planning. JOURNAL OF TECHNICAL EDUCATION SCIENCE, 19(1), 64–73. https://doi.org/10.1049/icp.2025.0851

Iqbal, R., Ansari, N. M., Awan, M. ur R., Ismail, M., & Gul, H. (2025). Design and Evaluation of Lightweight Cryptographic Algorithms for Internet of Things (IoT) Devices: Achieving Optimal Trade-Offs Between Security, Computational Speed, and Energy Efficiency in Resource-Constrained Environments. THE PROGRESS: A Journal of Multidisciplinary Studies, 6(1), 85–99. https://doi.org/10.71016/tp/smfybz24

Jamshed, M. A., Ali, K., Abbasi, Q. H., Imran, M. A., & Ur-Rehman, M. (2022). Challenges, Applications, and Future of Wireless Sensors in Internet of Things: A Review. IEEE Sensors Journal, 22(6), 5482–5494. https://doi.org/10.1109/JSEN.2022.3148128

Kaur, J., Canto, A. C., Kermani, M. M., & Azarderakhsh, R. (2023). A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard. ACM Comput, 1–16. http://arxiv.org/abs/2304.06222

Kodali, R. K., & Kirti, B. (2020). NS-3 Model of an IoT network. In 2020 IEEE 5th International Conference on Computing Communication and Automation, ICCCA, 699–702. https://doi.org/10.1109/ICCCA49541.2020.9250808

Lata, S., Mehfuz, S., & Urooj, S. (2021). Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies. IEEE Access, 9, 161103–161128. https://doi.org/10.1109/ACCESS.2021.3131367

Li, C. T. (2010). Security of Wireless Sensor Networks: Current Status and Key Issues. Smart Wireless Sensor Networks.

Nourildean, S. W., Hassib, M. D., & Mohammed, Y. A. (2022). Internet of things based wireless sensor network: a review. Indonesian Journal of Electrical Engineering and Computer Science, 27(1), 246–261. https://doi.org/10.11591/ijeecs.v27.i1.pp246-261

Ouni, R., & Saleem, K. (2022). Framework for Sustainable Wireless Sensor Network Based Environmental Monitoring. Sustainability, 14(14), 1–26. https://doi.org/10.3390/su14148356

Padmavathi, D. G., & Shanmugapriya, M. D. (2009). A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. (IJCSIS) International Journal of Computer Science and Information Security, 4(1), 1–9. http://arxiv.org/abs/0909.0576

Radhakrishnan, I., Jadon, S., & Honnavalli, P. B. (2024). Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors, 24(12), 1–19. https://doi.org/10.3390/s24124008

Ramonet, A. G., Pecorella, T., Picano, B., & Kinoshita, K. (2024). Perspectives on IoT-oriented network simulation systems. Computer Networks, 253, 1–9. https://doi.org/10.1016/j.comnet.2024.110749

Rana, M., Mamun, Q., & Islam, R. (2022). Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems, 129, 77–89. https://doi.org/10.1016/j.future.2021.11.011

Rozlomii, I., Yarmilko, A., & Naumenko, S. (2024). Data security of IoT devices with limited resources: challenges and potential solutions. Doors, 3666, 85–96.

Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 15(2), 1625–1642. https://doi.org/10.1007/s12652-017-0494-4

Sonmez, T., Meltem, McKay, K., Chang, D., Kang, J., & Kelsey, J. (2024). Ascon-based lightweight cryptography standards for constrained devices: authenticated encryption, hash, and extendable output functions. (No. NIST Special Publication (SP), 800-232 (Draft)).

Thakor, V. A., Razzaque, M. A., & Khandaker, M. R. A. (2021). Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access, 9, 28177–28193. https://doi.org/10.1109/ACCESS.2021.3052867

Turan, M. S., McKay, K., Chang, D., Calik, C., Bassham, L., Kang, J., & Kelsey, J. (2021). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process. In National Institute of Standards and Technology (pp. 1–92).

Wu, H., Nabar, S., & Poovendran, R. (2011). An energy framework for the network simulator 3 (ns-3). In Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 3, 222–230. https://doi.org/10.4108/icst.simutools.2011.245584


Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Bayu Widodo, Mohammad Fazrie, Dudi Parulian*

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0