Open Access Open Access  Restricted Access Subscription or Fee Access

Measurement Based Analysis of Cryptographic Algorithms for Embedded Real-Time Platforms

M. Santhosh Sheela, E. Sumathi, R. Vishnupriya

Abstract


In battery-powered security-critical embedded platforms, security and energy are the two main concerns. In this paper, the efforts are made to identify energy-related characteristics of common security algorithms for data-sensitive embedded real-time platforms. Unlike traditional researches, this paper focuses on the influences of size of protected data on energy consumption of security algorithms. An analysis framework on potential features of energy consumption from the angles of speed, time and data size is presented. The energy features of most popular cryptographic algorithms including asymmetric and hash algorithms are well practiced All the analysis is based on protected data size measured by a processor which runs security algorithms under LINUX. This paper could provide some useful information to help the design of security-critical applications in embedded real-time platforms.


Keywords


Embedded Real-Time Platforms, Security-Critical Systems, Energy Consumption, Asymmetric and Hash Algorithms, Protected Data Size.

Full Text:

PDF

References


V. Tiwari, S. Malik, A. Wolfe, “Power Analysis of Embedded Software: A First Step towards Software Power Minimization,” IEEE/ACM International Conference on Computer-Aided Design, pp. 384-390, 2004.

V. Tiwari, M. Lee, “Power Analysis of A 32-bit Embedded Microcontroller,” In Proceedings of Asia and South Pacific Design Automation Conference, pp. 141-148, 1995.

R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma, “Battery Power-Aware Encryption,” ACM Transactions on Information and System Security, vol. 9, pp. 162–180, 2006.

W. Freeman, E. Miller, “An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems,” International Symposium on Modeling, Analysis, and Simulation of Computer and Telecomm Systems, pp. 348-357, 1999.

C. Comaniciu, “On energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks”, Journal of Cyber Security and Mobility, January, pp.53-64, 2012.

C. Chang, S. Muftic, D.J. Nagel, “Measurement of Energy Costs of Security in Wireless Sensor Nodes”, Proceedings of 16th International Conference on Computer Communications and Networks, pp. 95-102, 2007.

A. Acquaviva, L. Benini, B. Ricco, “Energy Characterization of Embedded Real-time Operating Systems,” ACM SIGARCH Computer Architecture News, vol. 29, no.5, pp.13-18, 2001.

N. R. Potlapally, S. Ravi, A. Raghunathan, N. K. Jha, “A Study of the Energy Consumption Characteristics of Cryptographic Algorithm and Security Protocols,” IEEE Transactions on Mobile Computing, vol. 5, no.2, pp.128-143, 2006.

Wei Jiang, Zhenlin Guo, Yue Ma, Nan Sang “Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measur ement-Based Analysis” IEEE international conference on High Performance Computing and communications, 2012.

Peter Gutmann, Cryptlib Security Toolkit Version 3.4, http://www.cryptlib.com.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.