DocumentCode :
773569
Title :
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
Author :
Potlapally, Nachiketh R. ; Ravi, Srivaths ; Raghunathan, Anand ; Jha, Niraj K.
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., NJ, USA
Volume :
5
Issue :
2
fYear :
2006
Firstpage :
128
Lastpage :
143
Abstract :
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.
Keywords :
Linux; cryptography; data acquisition; mobile handsets; protocols; telecommunication security; wireless LAN; IPAQ PDA; Linux; PC-based data acquisition; battery-powered mobile appliances; cryptographic algorithms; energy consumption; secure sockets layer; transport-layer security protocols; wireless LAN; wireless local area network; Cellular phones; Cryptographic protocols; Cryptography; Current measurement; Data security; Energy consumption; Energy efficiency; Home appliances; Personal digital assistants; System testing; AES; DES; DSA; Diffie-Hellman; ECC; Index Terms- 3DES; RSA; SSL.; cryptographic algorithms; embedded system; energy analysis; handheld; low-power; security; security protocols;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2006.16
Filename :
1563998
Link To Document :
بازگشت