Skip to main content
Erschienen in: Journal of Cryptographic Engineering 2/2022

24.11.2021 | Regular Paper

In-depth energy analysis of security algorithms and protocols for the Internet of Things

verfasst von: Jori Winderickx, An Braeken, Dave Singelée, Nele Mentens

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have to be designed and implemented. Related work mainly concentrates either on low-energy security algorithms and protocols, or on low-energy wireless communication. However, it is important for system developers to take into account the overall energy consumption of the IoT system when making design choices. Therefore, this work presents an in-depth analysis of the energy consumption of IoT devices that provide end-to-end secure communication and digital signatures. The paper follows a granular approach, profiling and measuring each individual contribution to the overall energy consumption, including the computation of cryptographic operations as well as the wireless transmission of messages in cryptographic protocols. The paper also calculates the minimal time period of a secure communication session in order to minimize the energy impact of the session’s setup phase and thus minimize the overall average power consumption. The goal of this work is to provide assistance in the selection of a suitable wireless communication standard and cryptographic cipher suite for building end-to-end secure IoT applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sornin, N., Luis, M., Eirich, T., Kramp, T., Hersent, O.: LoRaWAN Specification V1.0. Tech. rep., LoRa Alliance (2015) Sornin, N., Luis, M., Eirich, T., Kramp, T., Hersent, O.: LoRaWAN Specification V1.0. Tech. rep., LoRa Alliance (2015)
2.
Zurück zum Zitat Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology: Proceedings of CRYPTO’99, no. 1666 in Lecture Notes in Computer Science, pp. 388–397. Springer, Berlin (1999) Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology: Proceedings of CRYPTO’99, no. 1666 in Lecture Notes in Computer Science, pp. 388–397. Springer, Berlin (1999)
3.
Zurück zum Zitat Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), no. 2162 in Lecture Notes in Computer Science, pp. 255–265. Springer, Berlin (2001) Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) Proceedings of 3rd International Workshop on Cryptographic Hardware and Embedded Systems (CHES), no. 2162 in Lecture Notes in Computer Science, pp. 255–265. Springer, Berlin (2001)
4.
Zurück zum Zitat Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer, Berlin (1996) Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer, Berlin (1996)
9.
Zurück zum Zitat Großschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS ’07, pp. 380–382. Association for Computing Machinery, New York, NY, USA (2007). https://doi.org/10.1145/1229285.1229334 Großschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS ’07, pp. 380–382. Association for Computing Machinery, New York, NY, USA (2007). https://​doi.​org/​10.​1145/​1229285.​1229334
10.
Zurück zum Zitat de Meulenaer, G., Gosset, F., Standaert, F., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 580–585 (2008). https://doi.org/10.1109/WiMob.2008.16 de Meulenaer, G., Gosset, F., Standaert, F., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 580–585 (2008). https://​doi.​org/​10.​1109/​WiMob.​2008.​16
18.
Zurück zum Zitat Core System Package [Low Energy Controller volume] Bluetooth, SIG, Specification of the Bluetooth System v4.1 6, 2467 (2013) Core System Package [Low Energy Controller volume] Bluetooth, SIG, Specification of the Bluetooth System v4.1 6, 2467 (2013)
25.
Zurück zum Zitat Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak reference. Tech. rep, STMicroelectronics, NXP Semiconductors (2011) Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak reference. Tech. rep, STMicroelectronics, NXP Semiconductors (2011)
30.
Zurück zum Zitat Winderickx, J., Bellier, P., Duflot, P., Coppieters, D., Mentens, N.: WiP: communication and security trade-offs for wearable medical sensor systems in hospitals. In: Proceedings of the ACM SIGBED International Conference on Embedded Software (EMSOFT), p. 2. ACM, New York, NY, USA (2019) Winderickx, J., Bellier, P., Duflot, P., Coppieters, D., Mentens, N.: WiP: communication and security trade-offs for wearable medical sensor systems in hospitals. In: Proceedings of the ACM SIGBED International Conference on Embedded Software (EMSOFT), p. 2. ACM, New York, NY, USA (2019)
31.
Zurück zum Zitat Roussey, C., Bernard, S., Andre, G., Corcho, O., Sousa, G.D., Boffety, D., Chanet, J.P.: Short paper: weather station data publication at IRSTEA: an implementation report. In: Kyzirakos, K., Gruetter, R., Kolas, D., Perry, M., Compton, M., Janowicz, K., Taylor, K. (eds.) Joint Proceedings of the 6th International Workshop on the Foundations, Technologies and Applications of the Geospatial Web and 7th International Workshop on Semantic Sensor Networks (TC-SSN) (Aachen, 2014), no. 1401 in CEUR Workshop Proceedings, pp. 89–104. http://ceur-ws.org/Vol-1401/#paper-07 Roussey, C., Bernard, S., Andre, G., Corcho, O., Sousa, G.D., Boffety, D., Chanet, J.P.: Short paper: weather station data publication at IRSTEA: an implementation report. In: Kyzirakos, K., Gruetter, R., Kolas, D., Perry, M., Compton, M., Janowicz, K., Taylor, K. (eds.) Joint Proceedings of the 6th International Workshop on the Foundations, Technologies and Applications of the Geospatial Web and 7th International Workshop on Semantic Sensor Networks (TC-SSN) (Aachen, 2014), no. 1401 in CEUR Workshop Proceedings, pp. 89–104. http://​ceur-ws.​org/​Vol-1401/​#paper-07
Metadaten
Titel
In-depth energy analysis of security algorithms and protocols for the Internet of Things
verfasst von
Jori Winderickx
An Braeken
Dave Singelée
Nele Mentens
Publikationsdatum
24.11.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 2/2022
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-021-00274-7

Weitere Artikel der Ausgabe 2/2022

Journal of Cryptographic Engineering 2/2022 Zur Ausgabe