Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices
نویسندگان
چکیده
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of network devices jeopardize the actual implementation of such mechanisms. In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography on personal agendas, and compare them with the costs of basic operating system functions. Results show that although cryptographic power costs are high and such operations shall be restricted in time, they are not the main limiting factor of the autonomy of a device.
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملA Variation of the WTLS Authentication Protocol for Reducing Energy Consumption in Wireless Devices
Energy efficiency has been an important factor in protocol design in wireless networks where small handheld wireless devices rely solely on battery power. Security is also of great concern in wireless networks. Several security protocols adapted from wired networks have been used in wireless networks to provide identity authentication. Security protocols could contribute significantly to energy...
متن کاملCryptographic Energy Costs Are Assumable in Ad Hoc Networks
Performance of symmetric and asymmetric cryptography algorithms in small devices is presented. Both temporal and energy costs are measured and compared with the basic functional costs of a device. We demonstrate that cryptographic power costs are not a limiting factor of the autonomy of a device and explain how processing delays can be conveniently managed to minimize their impact. key words: p...
متن کاملImplementing Security Measures for Portable Devices
There has been an explosive growth in the use of handheld devices. With the use of handheld devices such as Personal Digital Assistants (PDAs), mobile phones, Global Positioning System (GPS) etc the world of business communication is changing. But at the same time it poses major concerns in the security. It is becoming increasingly difficult to utilize strong security protocols on handheld devi...
متن کاملTopology Optimization of the Thickness Profile of Bimorph Piezoelectric Energy Harvesting Devices
Due to developments in additive manufacturing, the production of piezoelectric materials with complex geometries is becoming viable and enabling the manufacturing of thicker harvesters. Therefore, in this study a piezoelectric harvesting device is modelled as a bimorph cantilever beam with a series connection and an intermediate metallic substrate using the plain strain hypothesis. On the other...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Future Internet
دوره 3 شماره
صفحات -
تاریخ انتشار 2011