Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
نویسندگان
چکیده
منابع مشابه
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launchin...
متن کاملEnergy cost analysis of IPSec on handheld devices
We analyze the computation overhead of the IP security protocol (IPSec) on a handheld device. We design experiments to quantify the energy consumed by the individual components in IPSec. We then experiment with several measures which can potentially cut the energy consumption without compromising security. Our results show that by replacing 3DES with Advanced Encryption Standard as the encrypti...
متن کاملEnergy Consumption for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices
In mobile devices, smart cards become the trend and are used in numerous applications and services. Since mobile devices are battery-powered, so it is important to find energy saving solutions to reduce energy consumption. Most mobile devices are powered by batteries with limited power capacity. In order to protect information during the communication process, security system designers use many...
متن کاملSignature Verification on Handheld Devices
Signature verification for handheld devices (e.g. smartphones, PDAs, etc.) as an authentication method is studied. Signature can be used to authenticate users in mobile networks for secure transactions. The challenges of signature verification on mobile devices are addressed and analyzed and the architecture for a verification platform is outlined. We propose a verification system adapted to ha...
متن کاملAuthenticating Users on Handheld Devices
Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by the sensitive information they may contain, but also the means to access such information they may provide. U...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2011
ISSN: 1999-5903
DOI: 10.3390/fi3010031