Resource Optimized Security Coding in Light Weight Security Protocol
Sunitha Tappari1, K. Sridevi2
1Sunitha Tappari, Department of Electronics and Telematics Engineering, G. Narayanamma Institute of Technology and Science, JNTUH, Hyderabad, India.
2K. Sridevi, Associate Professor, Department of Engineering and Communication Engineering, GITAM Institute of Technology, GITAM University, Vishakapatnam, India.
Manuscript received on 05 August 2019 | Revised Manuscript received on 10 August 2019 | Manuscript published on 30 August 2019 | PP: 2645-2651 | Volume-8 Issue-10, August 2019 | Retrieval Number: J93930881019/19©BEIESP | DOI: 10.35940/ijitee.J9393.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The overhead for resource utilization in the round coding operation of security coding is large. Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization. This resource consumption intern leads to large power consumption and area overhead. To minimize the resource utilization in this paper, a new resource optimization technique following resource reutilization scheme is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography coding.
Index Terms: Security Coding, Resource Optimization, Resource Reutilization, Light Weight Coding
Scope of the Article: Design Optimization of Structures