Skip to main content
Log in

Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Data security is currently become a serious concern in wireless communication system for both the users and providers. Without a secure medium, the data transmission is exposed to various types of wireless attacks. Therefore, this paper focuses on the development of a high performance parallel-pipelined-memory-based (P2M) Blowfish as a security design with reduced field programmable gate array (FPGA) utilization, which is the best security design to be embedded in the mobile devices. Through FPGA platform, the performance of the proposed Blowfish shows that a throughput increases by 10.5%, with the hardware utilization and power consumption decrease by 3.5% and 21%, respectively. The P2M Blowfish was validated in two-way communication channel by using FPGA-based radio platform together with ZigBee technology and the real-time transmission was measured in terms of bit-error-rate, received power and communication range. These characteristics have proven that the proposed P2M Blowfish possesses the ability to replace the advanced encryption standard which is known as a complex algorithm employed by most of the wireless communication standards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ahmad, R., Manaf, A. A., & Ismail, W. (2016). Implementation of a high-performance Blowfish for secure wireless communication. Journal of Telecommunication, Electronic and Computer Engineering, 8(6), 147–151.

    Google Scholar 

  2. Ahmad, R., & Ismail, W. (2013). A survey of high performance cryptography algorithms for WiMAX applications using SDR. In A. Al-Dulaimi, J. Cosmas, & A. Mohammed (Eds.), Self-organization and green applications in cognitive radio networks. Chapter 11 (pp. 231–246). Hershey: IGI-Global.

    Chapter  Google Scholar 

  3. Karthigaikumar, P., & Baskaran, K. (2010). Partially pipelined VLSI implementation of blowfish encryption/decryption algorithm. International Journal of Image and Graphics, 10(3), 327–341.

    Article  MathSciNet  Google Scholar 

  4. Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.

    Google Scholar 

  5. Thakur, J., & Kumar, N. (2011). DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International Journal of Emerging Technology and Advanced Engineering, 1(2), 6–12.

    Google Scholar 

  6. Dakate, D. K., & Dubey, P. (2012). Performance comparison of symmetric data encryption techniques. International Journal of Advanced Research in Computer Engineering & Technology, 1(4), 163–166.

    Google Scholar 

  7. Kumar, A., & Karthikeyan, S. (2012). Investigating the efficiency of blowfish and rejindael (AES) algorithms. International Journal Computer Network and Information Security, 2, 22–28.

    Article  Google Scholar 

  8. Mandal, P. C. (2012). Superiority of blowfish algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), 196–201.

    Google Scholar 

  9. Haldankar, C., & Kuwelkar, S. (2014). Implementation of AES and blowfish algorithm. International Journal of Research in Engineering and Technology., 3(3), 143–146.

    Google Scholar 

  10. Harinath, D., Murthy, M. V. R., & Chitra, B. (2015). Cryptographic methods and performance analysis of data encryption algorithms in network security. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 680–688.

    Google Scholar 

  11. Schneier, B., & Whiting, D. (1997). Fast software encryption: Designing encryption for optimal speed on the Intel Pentium processor. In Proceedings of 4th international workshop on fast software encryption. LNCS (pp. 242–259). Berlin: Springer.

  12. Ahmad, R., & Ismail, W. (2014). Implementation of high performance advanced encryption standard-128 for WiMAX application on FPGA. In Proceedings of the 2nd IEEE international symposium on telecommunication technologies (ISTT2014) (pp. 326–331), Langkawi.

  13. Xilinx, Inc. (2015). Zynq-7000 all programmable SoC overview. Product Specification, DS190, v(1.8).

  14. Digi International, Inc. (2015). XBee and XBee-PRO Zigbee: Embedded Zigbee modules provide OEMs with a simple way to integrate mesh technology into their application (pp. 1–3). Minnetonka: Digi International.

    Google Scholar 

  15. Mplemenos, G. G., Papadopoulos, K., & Papaefstathiou, I. (2010). Using reconfigurable hardware devices in WSNs for reducing the energy consumption of routing and security tasks. In Proceedings of IEEE global telecommunications conference (Globecom 2010) (pp. 1–5).

  16. Arur, P. C., Chandrasekhar, M. S., Sreeram, S. S., Ramkishore, K., & Gopal, C. V. (2014). Secure data transmission using Blowfish algorithm. International Journal of Innovative Research in Science and Engineering, 2(5), 2347–3207.

    Google Scholar 

  17. Priyadharshini, S. P., Arumuagam, N., & Ananthamani, K. S. (2014). Implementation of security in wireless sensor network using blowfish algorithm. In Proceedings of International Conference on Innovations in Information, Embedded and Communication (pp. 33–37). ICIIECS.

  18. Krishna, B. M., Varshini, J. S., Murthy, A. N., Santosh, N. A., Kumar, G. S. P., & Rao, B. S. V. (2015). RF module based wireless secured home automation system using FPGA. Journal of Theoretical and Applied Information Technology, 77(2), 273–279.

    Google Scholar 

  19. Kalaiarasi, D., & Prathipa, R. (2016). Zigbee based secured wireless transmission using advanced Blowfish cryptographic algorithm. Australian Journal of Basic and Applied Sciences, 10(1), 332–336.

    Google Scholar 

  20. Sudarshan, T. S. B., Mir, R. A., & Vijayalakshmi, S. (2005). DRIL-A flexible architecture for Blowfish algorithm encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 625–639). Berlin: Springer.

  21. Chatterjee, S. R., Majumder, S., & Pramanik, B. (2014). FPGA implementation of pipelined blowfish algorithm. In Proceedings of 5th international symposium electronic system design (pp. 208–209).

  22. Prasetyo, K. N., Purwanto, Y., & Darlis, D. (2014). An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In Proceedings of international conference on information and communication technology (ICoICT 2014) (pp. 75–79).

  23. Bansal, V. P., & Jassal, P. S. (2016). Synthesis and analysis of 64-bit blowfish algorithm using VHDL. International Journal of Engineering Sciences, 17(1), 316–322.

    Google Scholar 

  24. Xilinx, Inc. (2012). Virtex6 family overview. Product specification, DS150, v2.4, USA.

  25. Xilinx, Inc. (2012). ChipsScope Pro software and cores: User guide, UG029, v14.1, USA.

  26. Elbirt, A. J., Yip, W. Chetwynd, B. & Paar, C. (2000). An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists. In Proceedings of the third advanced encryption standard candidate conference (pp. 13–27). New York: National Institute of Standards and Technology (NIST).

  27. Dyken, J., & Delgado-Frias, J. G. (2010). FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm. Journal of Systems Architecture, 56, 116–123.

    Article  Google Scholar 

  28. Ahmad R., & Ismail W. (2016). Performance comparison of the improved power-throughput AES and Blowfish algorithms on FPGA. In Proceedings of the 9th international conference on robotics, vision, signal processing & power applications (ROVISP2016) (pp. 75–82), Penang.

  29. Ahmad, R., & Ismail, W. (2016). Performance comparison of advanced encryption standard-128 algorithms for WiMAX application with improved power-throughput. Journal of Engineering Science and Technology (JESTEC), 11(12), 1–17.

    Google Scholar 

  30. Xilinx, Inc. (2011). Power methodology guide, UG786, v13.1 (pp. 8–9), USA.

Download references

Acknowledgements

This research was financially supported by the Ministry of Science, Technology, and Innovation (MOSTI) ScienceFund Research Grant (Project No. 06-01-05-SF0640) and the Universiti Sains Malaysia Research University Grant for Individuals (RUI) (Project No. 1001/PELECT/814241).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafidah Ahmad.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, R., Kho, D., Abd. Manaf, A. et al. Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission. Wireless Pers Commun 104, 471–489 (2019). https://doi.org/10.1007/s11277-018-6031-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6031-8

Keywords

Navigation