In-depth energy analysis of security algorithms and protocols for the Internet of Things

被引:5
|
作者
Winderickx, Jori [1 ,2 ]
Braeken, An [3 ]
Singelee, Dave [2 ]
Mentens, Nele [1 ,2 ,4 ]
机构
[1] Katholieke Univ Leuven, ES&S, Leuven, Belgium
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] Vrije Univ Brussel, Dept Ind Engn INDI, Brussels, Belgium
[4] Leiden Univ, LIACS, Leiden, Netherlands
关键词
Data security; Embedded software; Energy consumption; Internet of Things (IoT); Wireless communication; Wireless networks;
D O I
10.1007/s13389-021-00274-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have to be designed and implemented. Related work mainly concentrates either on low-energy security algorithms and protocols, or on low-energy wireless communication. However, it is important for system developers to take into account the overall energy consumption of the IoT system when making design choices. Therefore, this work presents an in-depth analysis of the energy consumption of IoT devices that provide end-to-end secure communication and digital signatures. The paper follows a granular approach, profiling and measuring each individual contribution to the overall energy consumption, including the computation of cryptographic operations as well as the wireless transmission of messages in cryptographic protocols. The paper also calculates the minimal time period of a secure communication session in order to minimize the energy impact of the session's setup phase and thus minimize the overall average power consumption. The goal of this work is to provide assistance in the selection of a suitable wireless communication standard and cryptographic cipher suite for building end-to-end secure IoT applications.
引用
收藏
页码:137 / 149
页数:13
相关论文
共 50 条
  • [21] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    Wireless Networks, 2021, 27 : 1515 - 1555
  • [22] In-depth basic data detection device based on Internet of Things technology
    Xie S.
    Zhang Z.
    Cheng C.
    Wang J.
    Lian C.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [23] Analysis of Application Layer Protocols in Internet of Things
    Sasirekha, S.
    Swamynathan, S.
    Chandini, S.
    Keerthana, K.
    ADVANCES IN COMPUTING AND DATA SCIENCES, ICACDS 2016, 2017, 721 : 550 - 561
  • [24] AN ANALYSIS OF ROUTING PROTOCOLS IN MANETS AND INTERNET OF THINGS
    Thebiga, M.
    Pramila, R. Suji
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [25] Energy Saving Mechanisms in the Security of the Internet of Things
    Arrekhlou, Morteza Zolfpour
    Sarvqad, Afsoun
    Javan, Pouya Rouzbeh
    REVISTA PUBLICANDO, 2018, 5 (16): : 1 - 54
  • [26] Automated Analysis of Secure Internet of Things Protocols
    Kim, Jun Young
    Holz, Ralph
    Hu, Wen
    Jha, Sanjay
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 238 - 249
  • [27] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [28] Analysis of the Security of Internet of Multimedia Things
    Lv, Zhihan
    Qiao, Liang
    Song, Houbing
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [29] Analysis of Recommendation Algorithms for Internet of Things
    Mashal, Ibrahim
    Alsaryrah, Osama
    Chung, Tein-Yaw
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [30] Analysis and Design of Security in Internet of Things
    Tian, Cuihua
    Chen, Xuhui
    Guo, Di
    Sun, Jinhua
    Liu, Ling
    Hong, Jiangshui
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 678 - 684