Abstract
Data security is currently become a serious concern in wireless communication system for both the users and providers. Without a secure medium, the data transmission is exposed to various types of wireless attacks. Therefore, this paper focuses on the development of a high performance parallel-pipelined-memory-based (P2M) Blowfish as a security design with reduced field programmable gate array (FPGA) utilization, which is the best security design to be embedded in the mobile devices. Through FPGA platform, the performance of the proposed Blowfish shows that a throughput increases by 10.5%, with the hardware utilization and power consumption decrease by 3.5% and 21%, respectively. The P2M Blowfish was validated in two-way communication channel by using FPGA-based radio platform together with ZigBee technology and the real-time transmission was measured in terms of bit-error-rate, received power and communication range. These characteristics have proven that the proposed P2M Blowfish possesses the ability to replace the advanced encryption standard which is known as a complex algorithm employed by most of the wireless communication standards.
Similar content being viewed by others
References
Ahmad, R., Manaf, A. A., & Ismail, W. (2016). Implementation of a high-performance Blowfish for secure wireless communication. Journal of Telecommunication, Electronic and Computer Engineering, 8(6), 147–151.
Ahmad, R., & Ismail, W. (2013). A survey of high performance cryptography algorithms for WiMAX applications using SDR. In A. Al-Dulaimi, J. Cosmas, & A. Mohammed (Eds.), Self-organization and green applications in cognitive radio networks. Chapter 11 (pp. 231–246). Hershey: IGI-Global.
Karthigaikumar, P., & Baskaran, K. (2010). Partially pipelined VLSI implementation of blowfish encryption/decryption algorithm. International Journal of Image and Graphics, 10(3), 327–341.
Elminaam, D. S. A., Kader, H. M. A., & Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. International Journal of Network Security, 10(3), 213–219.
Thakur, J., & Kumar, N. (2011). DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. International Journal of Emerging Technology and Advanced Engineering, 1(2), 6–12.
Dakate, D. K., & Dubey, P. (2012). Performance comparison of symmetric data encryption techniques. International Journal of Advanced Research in Computer Engineering & Technology, 1(4), 163–166.
Kumar, A., & Karthikeyan, S. (2012). Investigating the efficiency of blowfish and rejindael (AES) algorithms. International Journal Computer Network and Information Security, 2, 22–28.
Mandal, P. C. (2012). Superiority of blowfish algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), 196–201.
Haldankar, C., & Kuwelkar, S. (2014). Implementation of AES and blowfish algorithm. International Journal of Research in Engineering and Technology., 3(3), 143–146.
Harinath, D., Murthy, M. V. R., & Chitra, B. (2015). Cryptographic methods and performance analysis of data encryption algorithms in network security. International Journal of Advanced Research in Computer Science and Software Engineering, 5(7), 680–688.
Schneier, B., & Whiting, D. (1997). Fast software encryption: Designing encryption for optimal speed on the Intel Pentium processor. In Proceedings of 4th international workshop on fast software encryption. LNCS (pp. 242–259). Berlin: Springer.
Ahmad, R., & Ismail, W. (2014). Implementation of high performance advanced encryption standard-128 for WiMAX application on FPGA. In Proceedings of the 2nd IEEE international symposium on telecommunication technologies (ISTT2014) (pp. 326–331), Langkawi.
Xilinx, Inc. (2015). Zynq-7000 all programmable SoC overview. Product Specification, DS190, v(1.8).
Digi International, Inc. (2015). XBee and XBee-PRO Zigbee: Embedded Zigbee modules provide OEMs with a simple way to integrate mesh technology into their application (pp. 1–3). Minnetonka: Digi International.
Mplemenos, G. G., Papadopoulos, K., & Papaefstathiou, I. (2010). Using reconfigurable hardware devices in WSNs for reducing the energy consumption of routing and security tasks. In Proceedings of IEEE global telecommunications conference (Globecom 2010) (pp. 1–5).
Arur, P. C., Chandrasekhar, M. S., Sreeram, S. S., Ramkishore, K., & Gopal, C. V. (2014). Secure data transmission using Blowfish algorithm. International Journal of Innovative Research in Science and Engineering, 2(5), 2347–3207.
Priyadharshini, S. P., Arumuagam, N., & Ananthamani, K. S. (2014). Implementation of security in wireless sensor network using blowfish algorithm. In Proceedings of International Conference on Innovations in Information, Embedded and Communication (pp. 33–37). ICIIECS.
Krishna, B. M., Varshini, J. S., Murthy, A. N., Santosh, N. A., Kumar, G. S. P., & Rao, B. S. V. (2015). RF module based wireless secured home automation system using FPGA. Journal of Theoretical and Applied Information Technology, 77(2), 273–279.
Kalaiarasi, D., & Prathipa, R. (2016). Zigbee based secured wireless transmission using advanced Blowfish cryptographic algorithm. Australian Journal of Basic and Applied Sciences, 10(1), 332–336.
Sudarshan, T. S. B., Mir, R. A., & Vijayalakshmi, S. (2005). DRIL-A flexible architecture for Blowfish algorithm encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (pp. 625–639). Berlin: Springer.
Chatterjee, S. R., Majumder, S., & Pramanik, B. (2014). FPGA implementation of pipelined blowfish algorithm. In Proceedings of 5th international symposium electronic system design (pp. 208–209).
Prasetyo, K. N., Purwanto, Y., & Darlis, D. (2014). An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In Proceedings of international conference on information and communication technology (ICoICT 2014) (pp. 75–79).
Bansal, V. P., & Jassal, P. S. (2016). Synthesis and analysis of 64-bit blowfish algorithm using VHDL. International Journal of Engineering Sciences, 17(1), 316–322.
Xilinx, Inc. (2012). Virtex6 family overview. Product specification, DS150, v2.4, USA.
Xilinx, Inc. (2012). ChipsScope Pro software and cores: User guide, UG029, v14.1, USA.
Elbirt, A. J., Yip, W. Chetwynd, B. & Paar, C. (2000). An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists. In Proceedings of the third advanced encryption standard candidate conference (pp. 13–27). New York: National Institute of Standards and Technology (NIST).
Dyken, J., & Delgado-Frias, J. G. (2010). FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm. Journal of Systems Architecture, 56, 116–123.
Ahmad R., & Ismail W. (2016). Performance comparison of the improved power-throughput AES and Blowfish algorithms on FPGA. In Proceedings of the 9th international conference on robotics, vision, signal processing & power applications (ROVISP2016) (pp. 75–82), Penang.
Ahmad, R., & Ismail, W. (2016). Performance comparison of advanced encryption standard-128 algorithms for WiMAX application with improved power-throughput. Journal of Engineering Science and Technology (JESTEC), 11(12), 1–17.
Xilinx, Inc. (2011). Power methodology guide, UG786, v13.1 (pp. 8–9), USA.
Acknowledgements
This research was financially supported by the Ministry of Science, Technology, and Innovation (MOSTI) ScienceFund Research Grant (Project No. 06-01-05-SF0640) and the Universiti Sains Malaysia Research University Grant for Individuals (RUI) (Project No. 1001/PELECT/814241).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmad, R., Kho, D., Abd. Manaf, A. et al. Parallel-Pipelined-Memory-Based Blowfish Design with Reduced FPGA Utilization for Secure ZigBee Real-Time Transmission. Wireless Pers Commun 104, 471–489 (2019). https://doi.org/10.1007/s11277-018-6031-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-6031-8