Study of the impact of information protection on the volumes of data packets of Internet of Things protocols

Keywords: Internet of Things, protocols, encryption, Wi-Fi, Bluetooth, ZigBee, WirelessHART, 6LoWPAN, NB-IoT, AES

Abstract

The article discusses the problem of increasing traffic volumes due to the use of encryption. Data packets of Wi-Fi, Bluetooth, 6LoWPAN standards, as well as ZigBee, WirelessHART and NB-IoT protocols were selected for analysis. It was determined which parts of the packet are encrypted and which algorithms are used for this. Wi-Fi, Bluetooth, ZigBee, 6LoWPAN and WirelessHART use the AES algorithm with a 128-bit key, while NB-IoT uses 128-EEA2 with the same key size. Both algorithms (AES and 128-EEA2) require the data to be a multiple of the key size, so a bit sequence is added to the payload to achieve the desired size. This increases the total size of the packet being transmitted. A study of this effect was carried out, and graphs were made showing the dependence of the amount of addition on the amount of useful data. The graphs have a sawtooth shape due to the fact that at certain volumes of useful data, the addition reaches its maximum value. The average volumes of additions for each standard were also calculated: Wi-Fi - 2.13%, Bluetooth - 10.64%, ZigBee - 24.81%, 6LoWPAN - 23.22%, WirelessHART - 23.08%, NB-IoT - 25.96%. The average values ​​of add-ons for packets up to 64 bytes were studied separately: Wi-Fi - 9.95%, Bluetooth - 16.31%, ZigBee - 8.00%, 6LoWPAN - 11.55%, WirelessHART - 10.12%, NB-IoT - 20.21%. In the absence of restrictions on the size of useful data, the best result was shown by the Wi-Fi standard, and the worst by NB-IoT. In cases with limited payload size, ZigBee performed best and NB-IoT performed worst

References

1. Kozel V., Ivanchuk O., Drozdova I., Prykhodko O. Automation of the Protocol Selection Process for IoT Systems. International Journal of Computing. 2022. № 21(2). P. 251-257. DOI: 10.47839/ijc.21.2.2594
2. Vasileios A. Memos, Kostas E. Psannis. Encryption algorithm for efficient transmission of HEVC media. Journal of Real-Time Image Processing. 2016. № 12. P. 473-482. DOI: 10.1007/s11554-015-0509-3
3. Victor Kathan Sarker, Tuan Nguyen Gia, Hannu Tenhunen, Tomi Westerlund, Lightweight Security Algorithms for Resource-constrained IoT-based Sensor Nodes. IEEE International Conference on Communications (ICC). Dublin, 2020. DOI: 10.1109/ICC40277.2020.9149359
4. E Gregersen. Wi-Fi. Encyclopaedia Britannica. 2023. URL: https://www.britannica.com/technology/Wi-Fi (дата звернення 14.10.2024).
5. R Laufer, L Kleinrock. The Capacity of Wireless CSMA/CA Networks. IEEE/ACM Transactions on Networking. 2016. № 24. P. 1518-1532. DOI: 10.1109/TNET.2015.2415465

Abstract views: 23
PDF Downloads: 10
Published
2025-02-13
How to Cite
Ivanchuk , O., & Kozel , V. (2025). Study of the impact of information protection on the volumes of data packets of Internet of Things protocols. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (57), 43-50. https://doi.org/10.36910/6775-2524-0560-2024-57-06
Section
Computer science and computer engineering