Skip to main content
Top
Published in: Wireless Personal Communications 4/2019

11-08-2018

Energy Efficient Data Encryption Techniques in Smartphones

Authors: Ghulam Mujtaba, Muhammad Tahir, Muhammad Hanif Soomro

Published in: Wireless Personal Communications | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing and storage. Managing security of mobile data is a necessary feature of every network and mostly encryption is used to avoid security breaches. The major challenge is that, mobile devices are very small with shortage of resources, on the other hand encryption of data requires extra energy. It is necessary to minimize energy requirements for encryption of data. For this experimental research, an android based application is developed, which optimize energy requirements for both single and double encryption techniques. AES and Blowfish encryption algorithms are used with different files sizes to test the energy requirements for single encryption, it is also examined that energy consumed by Blowfish is 119.311% more than AES. For double encryption methods, AES–Blowfish, Blowfish–AES and XTS–AES combinations of algorithms are used and energy usage is gathered. In double encryption XTS–AES consumed 13.26% less power consumption as compared to AES–Blowfish and 44.97% less then Blowfish–AES combination methods. Results of experiments revealed that AES is more energy efficient for single encryption and for double encryption XTS–AES combination requires less energy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Halpert, B. (2004). Mobile device security. In Proceedings of the 1st annual conference on information security curriculum development. Kennesaw, Georgia: ACM. Halpert, B. (2004). Mobile device security. In Proceedings of the 1st annual conference on information security curriculum development. Kennesaw, Georgia: ACM.
2.
go back to reference Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers and Security, 34, 47–66.CrossRef Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers and Security, 34, 47–66.CrossRef
3.
go back to reference Pfitzmann, A., Pfitzmann, B., Schunter, M., & Waidner, M. (1997). Trusting mobile user devices and security modules. IEEE Computer Journal, 30, 61–68.CrossRefMATH Pfitzmann, A., Pfitzmann, B., Schunter, M., & Waidner, M. (1997). Trusting mobile user devices and security modules. IEEE Computer Journal, 30, 61–68.CrossRefMATH
5.
go back to reference Alomari, M. A., & Samsudin, K. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In TENCON 2011-2011 IEEE region 10 conference (pp. 144–148). IEEE. Alomari, M. A., & Samsudin, K. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In TENCON 2011-2011 IEEE region 10 conference (pp. 144–148). IEEE.
6.
go back to reference Gotzfried, J., & Muller, T. (2013). ARMORED: CPU-bound encryption for android-driven ARM devices. In Eighth international conference on availability, reliability and security (ARES), 2013 (pp. 161–168). IEEE. Gotzfried, J., & Muller, T. (2013). ARMORED: CPU-bound encryption for android-driven ARM devices. In Eighth international conference on availability, reliability and security (ARES), 2013 (pp. 161–168). IEEE.
8.
go back to reference Karri, R., & Mishra, P. (2003). Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. Mobile Networks and Applications, 8(2), 177–185.CrossRef Karri, R., & Mishra, P. (2003). Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. Mobile Networks and Applications, 8(2), 177–185.CrossRef
9.
go back to reference Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc. Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc.
10.
go back to reference Al-Subaihin, A. A., Sarro, F., Black, S., Capra, L., Harman, M., Jia, Y., et al. (2016). Clustering mobile apps based on mined textual features. In Proceedings of the 10th ACM/IEEE international symposium on empirical software engineering and measurement (p. 38). ACM. Al-Subaihin, A. A., Sarro, F., Black, S., Capra, L., Harman, M., Jia, Y., et al. (2016). Clustering mobile apps based on mined textual features. In Proceedings of the 10th ACM/IEEE international symposium on empirical software engineering and measurement (p. 38). ACM.
11.
go back to reference Elminaam, D. S., Abdul, H. M., Kader, A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280–286. Elminaam, D. S., Abdul, H. M., Kader, A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280–286.
12.
go back to reference Lee, S., & Annavaram, M. (2012). Wireless body area networks: Where does energy go? In IEEE international symposium on workload characterization (IISWC), 2012 (pp. 25–35). IEEE. Lee, S., & Annavaram, M. (2012). Wireless body area networks: Where does energy go? In IEEE international symposium on workload characterization (IISWC), 2012 (pp. 25–35). IEEE.
13.
go back to reference Chin, C. A., Crosby, G. V., Ghosh, T., & Murimi, R. (2012). Advances and challenges of wireless body area networks for healthcare applications. In International conference on computing, networking and communications (ICNC), 2012 (pp. 99–103). IEEE. Chin, C. A., Crosby, G. V., Ghosh, T., & Murimi, R. (2012). Advances and challenges of wireless body area networks for healthcare applications. In International conference on computing, networking and communications (ICNC), 2012 (pp. 99–103). IEEE.
14.
go back to reference Latr, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.CrossRef Latr, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.CrossRef
15.
go back to reference Ameen, M. A., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93101.CrossRef Ameen, M. A., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93101.CrossRef
16.
go back to reference DelBello, C., Raihan, K., & Zhang, T. (2015). Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. Security and Communication Networks, 8(17), 2973–2980.CrossRef DelBello, C., Raihan, K., & Zhang, T. (2015). Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. Security and Communication Networks, 8(17), 2973–2980.CrossRef
17.
go back to reference Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc. Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc.
20.
go back to reference Umaparvathi, M., & Varughese, D. K. (2010). Evaluation of symmetric encryption algorithms for MANETs. In IEEE International conference on computational intelligence and computing research (ICCIC), 2010 (pp. 1–3). IEEE. Umaparvathi, M., & Varughese, D. K. (2010). Evaluation of symmetric encryption algorithms for MANETs. In IEEE International conference on computational intelligence and computing research (ICCIC), 2010 (pp. 1–3). IEEE.
21.
go back to reference Stallings, W. (2006). Cryptography and network security (4th ed.). Upper Saddle River: Prentice Hall Publication (pp. 232–314). Stallings, W. (2006). Cryptography and network security (4th ed.). Upper Saddle River: Prentice Hall Publication (pp. 232–314).
22.
go back to reference Ambrosin, M., Conti, M., & Dargahi, T. (2015). On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems. ACM. Ambrosin, M., Conti, M., & Dargahi, T. (2015). On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems. ACM.
23.
go back to reference Dworkin, M. (2010). Recommendation for block cipher modes of operation: The XTS–AES mode for confidentiality on storage devices. NIST special publication 800. Dworkin, M. (2010). Recommendation for block cipher modes of operation: The XTS–AES mode for confidentiality on storage devices. NIST special publication 800.
24.
go back to reference Martin, Luther. (2010). XTS: A mode of AES for encrypting hard disks. IEEE Security and Privacy, 8(3), 68–69.CrossRef Martin, Luther. (2010). XTS: A mode of AES for encrypting hard disks. IEEE Security and Privacy, 8(3), 68–69.CrossRef
Metadata
Title
Energy Efficient Data Encryption Techniques in Smartphones
Authors
Ghulam Mujtaba
Muhammad Tahir
Muhammad Hanif Soomro
Publication date
11-08-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2019
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5920-1

Other articles of this Issue 4/2019

Wireless Personal Communications 4/2019 Go to the issue