[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/871506.871518acmconferencesArticle/Chapter ViewAbstractPublication PagesislpedConference Proceedingsconference-collections
Article

Analyzing the energy consumption of security protocols

Published: 25 August 2003 Publication History

Abstract

Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired Internet, many new challenges arise due to the unique characteristics of battery powered embedded systems. In this work, we focus on an important constraint of such devices -- battery life -- and examine how it is impacted by the use of security protocols.We present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that are used as building blocks in security protocols. Furthermore, we study the energy consumption requirements of the most popular transport-layer security protocol SSL (Secure Sockets Layer). To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless LAN and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parametrizable SSL client and server test programs. We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on overall energy consumption for secure data transactions.Based on our results, we discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step towards addressing the challenges of energy efficient security for battery-constrained systems.

References

[1]
U. S. Department of Commerce, The Emerging Digital Economy II. http://www.esa.doc.gov/508/esa/TheEmergingDigitalEconomyII.htm, 1999.]]
[2]
W. W. W. Consortium, The World Wide Web Security FAQ. http://www.w3.org/Security/faq/www-security-faq.html, 1998.]]
[3]
W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall, 1998.]]
[4]
B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and Sons, 1996.]]
[5]
LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification: IEEE standard 802.11, 1990.]]
[6]
IPSec Working Group. http://www.ietf.org/html.charters/ipsec-charter.html.]]
[7]
SSL 3.0 Specification. http://wp.netscape.com/eng/ssl3/.]]
[8]
Wireless Application Protocol 2.0 - Technical White Paper. WAP Forum (http://www.wapforum.org/), Jan. 2002.]]
[9]
Compaq Ipaq Pocket PC. http://h20022.www2.hp.com, 2002.]]
[10]
D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and Approaches for Distributed Sensor Security. Network Associates Labs Tech. Rep. 00-010, 2000.]]
[11]
J. Goodman, A. Chandrakasan, and A. Dancy, "Design and implementation of a scalable encryption processor with embedded variable DC/DC converter," in Proc. Design Automation Conf., pp. 855--860, June 1999.]]
[12]
Z. Shi and R. Lee, "Bit permutation instructions for accelerating software cryptography," in Proc. IEEE Int. Conf. Application-specific Systems, Architectures and Processors, pp. 138--148, July 2000.]]
[13]
J. Burke, J. McDonald, and T. Austin, "Architectural support for fast symmetric-key cryptography," in Proc. Int. Conf. ASPLOS, pp. 178--189, Nov. 2000.]]
[14]
N. Potlapally, S. Ravi, A. Raghunathan, and G. Lakshminarayana, "Optimizing public-key encryption for wireless clients," in Proc. IEEE Int. Conf. Communications, pp. 1050--1056, May 2002.]]
[15]
S. Ravi, A. Raghunathan, N. Potlapally, and M. Shankaradass, "System design methodologies for wireless security processing platform," in Proc. Design Automation Conf., pp. 777--782, June 2002.]]
[16]
D. Boneh and N. Daswani, "Experimenting with electronic commerce on the PalmPilot," in Proc. Financial Cryptography, pp. 1--16, Feb. 1999.]]
[17]
W. Freeman and E. Miller, "An experimental analysis of cryptographic overhead in performance-critical systems," in Proc. Int. Symp. Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 348--357, Oct. 1999.]]
[18]
S. K. Miller, "Facing the challenges of wireless security," IEEE Computer, pp. 46--48, July 2001.]]
[19]
G. Apostolopoulos, V. Peris, P. Pradhan, and D. Saha, "Securing electronic commerce: Reducing the SSL overhead," IEEE Network, pp. 8--16, July 2000.]]
[20]
D. S. Wong, H. H. Fuentes, and A. H. Chan, "The performance measurement of cryptographic primitives on Palm devices," in Proc. Annual Computer Security Applications Conf., pp. 92--101, Dec. 2001.]]
[21]
S. Ravi, A. Raghunathan, and N. Potlapally, "Securing wireless data: System architecture challenges," in Proc. Int. Symp. System Synthesis, pp. 195--200, Oct 2002.]]
[22]
A. Hodjat and I. Verbauwhede, "The energy cost of secrets in ad-hoc networks," in Proc. IEEE CAS Wkshp. Wireless Communication and Networking, Sept. 2002.]]
[23]
M. Jakobsson and D. Pointcheval, "Mutual authentication for low-power mobile devices," in Proc. Financial Cryptography, pp. 178--195, Feb. 2001.]]
[24]
D. S. Wong and A. H. Chan, "Mutual authentication and key exchange for low power wireless communications," in Proc. IEEE MILCOM Conf., pp. 39--43, Oct. 2001.]]
[25]
Y. W. Law, S. Dulman, S. Etalle, and P. J. M. Havinga, Assessing Security-Critical Energy-Efficient Sensor Networks. Univ. of Twente, The Netherlands, Tech. Rep. TR-CTIT-02-18, July 2002.]]
[26]
R. Karri and P. Mishra, "Minimizing energy consumption of secure wireless session with QoS constraints," in Proc. Int. Conf. Communications, pp. 2053--2057, May 2002.]]
[27]
OpenSSL Project. http://www.openssl.org.]]
[28]
Familiar Project. http://familiar.handhelds.org.]]
[29]
National Instruments Corp. http://www.ni.com.]]
[30]
V. Gupta, S. Gupta, S. Chang, and D. Stebila, "Performance analysis of elliptic curve cryptography for SSL," in Proc. ACM Wkshp. Wireless Security, pp. 87--94, Sept. 2002.]]
[31]
Y. L. Yin, "The RC5 encryption algorithm: Two years on," RSA Laboratories' Cryptobytes, vol. winter, pp. 14--15, 1997.]]

Cited By

View all
  • (2024)Cachet: Low-Overhead Integrity Verification on Metadata Cache in Secure Nonvolatile Memory SystemsIEEE Micro10.1109/MM.2023.333535444:1(38-48)Online publication date: 1-Jan-2024
  • (2023)Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A SurveyAdvances in Information and Communication10.1007/978-3-031-28073-3_47(695-708)Online publication date: 2-Mar-2023
  • (2022)Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data CommunicationSymmetry10.3390/sym1412249414:12(2494)Online publication date: 24-Nov-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ISLPED '03: Proceedings of the 2003 international symposium on Low power electronics and design
August 2003
502 pages
ISBN:158113682X
DOI:10.1145/871506
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 3DES
  2. AES
  3. DES
  4. DSA
  5. Diffie-Hellman
  6. ECC
  7. RSA
  8. SSL
  9. cryptographic algorithms
  10. embedded system
  11. energy analysis
  12. handheld
  13. low-power
  14. security
  15. security protocols

Qualifiers

  • Article

Conference

ISLPED03
Sponsor:

Acceptance Rates

ISLPED '03 Paper Acceptance Rate 90 of 221 submissions, 41%;
Overall Acceptance Rate 398 of 1,159 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)43
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cachet: Low-Overhead Integrity Verification on Metadata Cache in Secure Nonvolatile Memory SystemsIEEE Micro10.1109/MM.2023.333535444:1(38-48)Online publication date: 1-Jan-2024
  • (2023)Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A SurveyAdvances in Information and Communication10.1007/978-3-031-28073-3_47(695-708)Online publication date: 2-Mar-2023
  • (2022)Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data CommunicationSymmetry10.3390/sym1412249414:12(2494)Online publication date: 24-Nov-2022
  • (2022)Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC)2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC)10.1109/IGSC55832.2022.9969377(1-7)Online publication date: 24-Oct-2022
  • (2022)Light Weight Cryptography for Cloud-Based E-Health Records2022 7th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES54183.2022.9835827(690-696)Online publication date: 22-Jun-2022
  • (2022)A Blockchain Architecture for Trusted Sub-Ledger Operations and Financial Audit Using Decentralized MicroservicesIEEE Access10.1109/ACCESS.2022.320188510(90873-90886)Online publication date: 2022
  • (2022)Context-aware security for the Intra-Electric Vehicle Network under energy constraintsComputers and Electrical Engineering10.1016/j.compeleceng.2021.10751797:COnline publication date: 1-Jan-2022
  • (2022)Image Transmission Using Leach and Security Using RSA in Wireless Sensor NetworksComputational Vision and Bio-Inspired Computing10.1007/978-981-16-9573-5_3(39-51)Online publication date: 31-Mar-2022
  • (2022)Datenschutz und Privatheitsschutz durch Gestaltung der SystemeDie Zukunft von Privatheit und Selbstbestimmung10.1007/978-3-658-35263-9_8(259-300)Online publication date: 24-May-2022
  • (2021)A Creation Cryptographic Protocol for the Division of Mutual Authentication and Session Key2021 International Conference on Information Science and Communications Technologies (ICISCT)10.1109/ICISCT52966.2021.9670057(1-6)Online publication date: 3-Nov-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media