
(2) Mohammad Fazrie

(3) * Dudi Parulian

*Corresponding author
AbstractCommunication security in Wireless Sensor Networks (WSNs) is a significant challenge in the implementation of the Internet of Things (IoT), particularly in smart city applications which have limitations in energy, memory, and computation. Conventional cryptographic algorithms are generally not suitable for IoT devices due to their complexity and high resource requirements, necessitating lightweight cryptography (LWC) algorithms that can balance security and efficiency. This research evaluates three lightweight encryption algorithms - Speck, Simon, and Ascon - using NS-3 simulations in a multi-hop network scenario with 30 nodes. The parameters analyzed include energy consumption, encryption/decryption time, and communication overhead. The simulation results show a significant trade-off: Speck and Simon excel in energy efficiency and low latency, but their security level is moderate; while Ascon provides stronger security according to NIST LWC standards, but with the consequence of higher energy consumption. The main contribution of this research is the provision of a reproducible NS-3 simulation-based framework that can link security and energy efficiency aspects, while also filling the literature gap, which is still limited to hardware testing. This finding is expected to serve as a practical reference for IoT system designers in determining the appropriate encryption algorithm for smart city application needs, and to open up opportunities for further research on real IoT devices.
KeywordsInternet of Things; Wireless Sensor Network; Lightweight Cryptography; Speck; Simon; Ascon; NS-3; Smart City
|
DOIhttps://doi.org/10.33122/ejeset.v6i2.1161 |
Article metricsAbstract views : 73 |
Cite |
References
Adday, Hassan, G., Subramaniam, S. K., Zukarnain, Z. A., & Samian, N. (2024). Investigating and analyzing simulation tools of wireless sensor networks: A comprehensive survey. IEEE Access, 12, 22938–22977.
Altowaijri, S. M. (2022). Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks. Future Internet, 14(2), 1–16. https://doi.org/10.3390/fi14020035
Anastasi, G., Conti, M., Francesco, D. M., & Neri, V. (2010). Reliability and energy efficiency in multi-hop IEEE 802.15.4/ZigBee Wireless Sensor Networks. Proceedings - IEEE Symposium on Computers and Communications, 336–341. https://doi.org/10.1109/ISCC.2010.5546804
Bakhsh, S. T. (2017). Energy-efficient distributed relay selection in wireless sensor network for Internet of Things. In 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC, 1802–1807. https://doi.org/10.1109/IWCMC.2017.7986557
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2014). The simon and speck block ciphers on avr 8-bit microcontrollers. In International Workshop on Lightweight Cryptography for Security and Privacy, 8898, 3–20. https://doi.org/10.1007/978-3-319-16363-5_1
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2015). Simon and Speck: Block Ciphers for the Internet of Things. Cryptology EPrint Archive, 1–15.
Belli, L., Cilfone, A., Davoli, L., Ferrari, G., Adorni, P., Di Nocera, F., Dall’olio, A., Pellegrini, C., Mordacci, M., & Bertolotti, E. (2020). IoT-enabled smart sustainable cities: Challenges and approaches. Smart Cities, 3(3), 1039–1071. https://doi.org/10.3390/smartcities3030052
Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., & Mastroianni, M. (2020). Computer network simulation with ns-3: A systematic literature review. Electronics, 9(2), 1–25. https://doi.org/10.3390/electronics9020272
Dobraunig, C., Eichlseder, M., Mendel, F., & Schläffer, M. (2021). Ascon v1.2: Lightweight Authenticated Encryption and Hashing. Journal of Cryptology, 34(3), 1–42. https://doi.org/10.1007/s00145-021-09398-9
El-hajj, M., Mousawi, H., & Fadlallah, A. (2023). Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform. Future Internet, 15(2), 1–29. https://doi.org/10.3390/fi15020054
Gulati, K., Boddu, R. S. K., Kapila, D., Bangare, S. L., Chandnani, N., & Saravanan, G. (2021). A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 51, 161–165. https://doi.org/10.1016/j.matpr.2021.05.067
Hoang, T. Van. (2024). Impact of Artificial Intelligence and Internet of Things Technologies on Smart Cities and Urban Planning. JOURNAL OF TECHNICAL EDUCATION SCIENCE, 19(1), 64–73. https://doi.org/10.1049/icp.2025.0851
Iqbal, R., Ansari, N. M., Awan, M. ur R., Ismail, M., & Gul, H. (2025). Design and Evaluation of Lightweight Cryptographic Algorithms for Internet of Things (IoT) Devices: Achieving Optimal Trade-Offs Between Security, Computational Speed, and Energy Efficiency in Resource-Constrained Environments. THE PROGRESS: A Journal of Multidisciplinary Studies, 6(1), 85–99. https://doi.org/10.71016/tp/smfybz24
Jamshed, M. A., Ali, K., Abbasi, Q. H., Imran, M. A., & Ur-Rehman, M. (2022). Challenges, Applications, and Future of Wireless Sensors in Internet of Things: A Review. IEEE Sensors Journal, 22(6), 5482–5494. https://doi.org/10.1109/JSEN.2022.3148128
Kaur, J., Canto, A. C., Kermani, M. M., & Azarderakhsh, R. (2023). A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard. ACM Comput, 1–16. http://arxiv.org/abs/2304.06222
Kodali, R. K., & Kirti, B. (2020). NS-3 Model of an IoT network. In 2020 IEEE 5th International Conference on Computing Communication and Automation, ICCCA, 699–702. https://doi.org/10.1109/ICCCA49541.2020.9250808
Lata, S., Mehfuz, S., & Urooj, S. (2021). Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies. IEEE Access, 9, 161103–161128. https://doi.org/10.1109/ACCESS.2021.3131367
Li, C. T. (2010). Security of Wireless Sensor Networks: Current Status and Key Issues. Smart Wireless Sensor Networks.
Nourildean, S. W., Hassib, M. D., & Mohammed, Y. A. (2022). Internet of things based wireless sensor network: a review. Indonesian Journal of Electrical Engineering and Computer Science, 27(1), 246–261. https://doi.org/10.11591/ijeecs.v27.i1.pp246-261
Ouni, R., & Saleem, K. (2022). Framework for Sustainable Wireless Sensor Network Based Environmental Monitoring. Sustainability, 14(14), 1–26. https://doi.org/10.3390/su14148356
Padmavathi, D. G., & Shanmugapriya, M. D. (2009). A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. (IJCSIS) International Journal of Computer Science and Information Security, 4(1), 1–9. http://arxiv.org/abs/0909.0576
Radhakrishnan, I., Jadon, S., & Honnavalli, P. B. (2024). Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices. Sensors, 24(12), 1–19. https://doi.org/10.3390/s24124008
Ramonet, A. G., Pecorella, T., Picano, B., & Kinoshita, K. (2024). Perspectives on IoT-oriented network simulation systems. Computer Networks, 253, 1–9. https://doi.org/10.1016/j.comnet.2024.110749
Rana, M., Mamun, Q., & Islam, R. (2022). Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems, 129, 77–89. https://doi.org/10.1016/j.future.2021.11.011
Rozlomii, I., Yarmilko, A., & Naumenko, S. (2024). Data security of IoT devices with limited resources: challenges and potential solutions. Doors, 3666, 85–96.
Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2024). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 15(2), 1625–1642. https://doi.org/10.1007/s12652-017-0494-4
Sonmez, T., Meltem, McKay, K., Chang, D., Kang, J., & Kelsey, J. (2024). Ascon-based lightweight cryptography standards for constrained devices: authenticated encryption, hash, and extendable output functions. (No. NIST Special Publication (SP), 800-232 (Draft)).
Thakor, V. A., Razzaque, M. A., & Khandaker, M. R. A. (2021). Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access, 9, 28177–28193. https://doi.org/10.1109/ACCESS.2021.3052867
Turan, M. S., McKay, K., Chang, D., Calik, C., Bassham, L., Kang, J., & Kelsey, J. (2021). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process. In National Institute of Standards and Technology (pp. 1–92).
Wu, H., Nabar, S., & Poovendran, R. (2011). An energy framework for the network simulator 3 (ns-3). In Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 3, 222–230. https://doi.org/10.4108/icst.simutools.2011.245584
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Bayu Widodo, Mohammad Fazrie, Dudi Parulian*

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

























