In-depth energy analysis of security algorithms and protocols for the Internet of Things

被引:0
|
作者
Jori Winderickx
An Braeken
Dave Singelée
Nele Mentens
机构
[1] ES&S and imec-COSIC,Department of Industrial Engineering (INDI)
[2] KU Leuven,undefined
[3] Vrije Universiteit Brussel,undefined
[4] imec-COSIC,undefined
[5] KU Leuven,undefined
[6] LIACS,undefined
[7] Leiden University,undefined
来源
关键词
Data security; Embedded software; Energy consumption; Internet of Things (IoT); Wireless communication; Wireless networks;
D O I
暂无
中图分类号
学科分类号
摘要
Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have to be designed and implemented. Related work mainly concentrates either on low-energy security algorithms and protocols, or on low-energy wireless communication. However, it is important for system developers to take into account the overall energy consumption of the IoT system when making design choices. Therefore, this work presents an in-depth analysis of the energy consumption of IoT devices that provide end-to-end secure communication and digital signatures. The paper follows a granular approach, profiling and measuring each individual contribution to the overall energy consumption, including the computation of cryptographic operations as well as the wireless transmission of messages in cryptographic protocols. The paper also calculates the minimal time period of a secure communication session in order to minimize the energy impact of the session’s setup phase and thus minimize the overall average power consumption. The goal of this work is to provide assistance in the selection of a suitable wireless communication standard and cryptographic cipher suite for building end-to-end secure IoT applications.
引用
收藏
页码:137 / 149
页数:12
相关论文
共 50 条
  • [1] In-depth energy analysis of security algorithms and protocols for the Internet of Things
    Winderickx, Jori
    Braeken, An
    Singelee, Dave
    Mentens, Nele
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2022, 12 (02) : 137 - 149
  • [2] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [3] Review of Internet of Things security protocols - A Bibliometric Analysis
    Mwansa, Gardner
    Mabanza, Ntima
    [J]. 2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
  • [4] Lightweight Security Protocols for the Internet of Things
    Wu, Xin-Wen
    Yang, En-Hui
    Wang, Junhu
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [5] Security Protocols for Internet of Things: A Survey
    Deshmukh, Snehal
    Sonavane, S. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 71 - 74
  • [6] Analysis on functionalities and security features of Internet of Things related protocols
    Alessandra Rizzardi
    Sabrina Sicari
    Alberto Coen-Porisini
    [J]. Wireless Networks, 2022, 28 : 2857 - 2887
  • [7] Analysis on functionalities and security features of Internet of Things related protocols
    Rizzardi, Alessandra
    Sicari, Sabrina
    Coen-Porisini, Alberto
    [J]. WIRELESS NETWORKS, 2022, 28 (07) : 2857 - 2887
  • [8] Security Level versus Energy Consumption in Wireless Protocols for Internet of Things
    Venckauskas, Algimantas
    Jusas, Nerijus
    Toldinas, Jevgenijus
    Kazanavicius, Egidijus
    [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2014, 2014, 465 : 419 - 429
  • [9] In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security
    Khan, Najeeb Ahmad
    Panchal, V. K.
    Tanweer, Safdar
    [J]. ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 27 - 41
  • [10] Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
    Aslan, Bora
    Yavuzer Aslan, Fusun
    Sakalli, M. Tolga
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020