In-depth energy analysis of security algorithms and protocols for the Internet of Things

被引:5
|
作者
Winderickx, Jori [1 ,2 ]
Braeken, An [3 ]
Singelee, Dave [2 ]
Mentens, Nele [1 ,2 ,4 ]
机构
[1] Katholieke Univ Leuven, ES&S, Leuven, Belgium
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] Vrije Univ Brussel, Dept Ind Engn INDI, Brussels, Belgium
[4] Leiden Univ, LIACS, Leiden, Netherlands
关键词
Data security; Embedded software; Energy consumption; Internet of Things (IoT); Wireless communication; Wireless networks;
D O I
10.1007/s13389-021-00274-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have to be designed and implemented. Related work mainly concentrates either on low-energy security algorithms and protocols, or on low-energy wireless communication. However, it is important for system developers to take into account the overall energy consumption of the IoT system when making design choices. Therefore, this work presents an in-depth analysis of the energy consumption of IoT devices that provide end-to-end secure communication and digital signatures. The paper follows a granular approach, profiling and measuring each individual contribution to the overall energy consumption, including the computation of cryptographic operations as well as the wireless transmission of messages in cryptographic protocols. The paper also calculates the minimal time period of a secure communication session in order to minimize the energy impact of the session's setup phase and thus minimize the overall average power consumption. The goal of this work is to provide assistance in the selection of a suitable wireless communication standard and cryptographic cipher suite for building end-to-end secure IoT applications.
引用
收藏
页码:137 / 149
页数:13
相关论文
共 50 条
  • [31] An In-Depth Symbolic Security Analysis of the ACME Standard
    Bhargavan, Karthikeyan
    Bichhawat, Abhishek
    Quoc Huy Do
    Hosseyni, Pedram
    Kuesters, Ralf
    Schmitz, Guido
    Wuertele, Tim
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2601 - 2617
  • [32] Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems
    Helbig, Colton
    Otoum, Safa
    Jararweh, Yaser
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [33] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [34] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [35] Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art
    Chahid, Yassine
    Benabdellah, Mohamed
    Azizi, Abdelmalek
    ICCWCS'17: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND WIRELESS COMMUNICATION SYSTEMS, 2017,
  • [36] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [37] Comprehensive Assessment of Security Attack Detection Algorithms in Internet of Things
    Karande, Jalindar B.
    Joshi, Sarang A.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [38] Security analysis on wireless sensor network in the data center for energy internet of things
    Xie S.
    Wang X.
    Shang H.
    International Journal of Safety and Security Engineering, 2020, 10 (03) : 397 - 402
  • [39] Distributed network security framework of energy internet based on internet of things
    Zhang, Jie
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 44
  • [40] Cyber security framework for Internet of Things-based Energy Internet
    Sani, Abubakar Sadiq
    Yuan, Dong
    Jin, Jiong
    Gao, Longxiang
    Yu, Shui
    Dong, Zhao Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 849 - 859