An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices
DOI:
https://doi.org/10.51983/ajcst-2012.1.1.1665Keywords:
Security, Energy analysis, Low-power, Handheld devices, Cryptographic algorithms, Authentication, Battery lifeAbstract
Due to the continuous advancement in technology, mobile devices are playing important role in everyone’s day to day life. Everyone is moving towards wireless mobile systems, but power consumption is an important concern in such devices. While designing, a lot of care has to be taken especially in power optimization because there is no regular power supply in this kind of devices. This paper represents software level cryptographic protocols for optimizing the power consumption in wireless mobile devices. The capacity of battery grows up very slowly, which is insufficient for the electricity that the handheld devices demand, and thus designs and implementations of battery-efficient systems are in urgent need. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms.The energy consumption of these algorithms is measured by loading their software level cryptographic protocol implementations through the device’s serial port, running them and measuring their power consumption. Our results will show that proposed cryptographic protocol provides a better security guarantee and acquires much less energy consumption than the existing cryptographic protocols. Finally, performance analysis will show that compared with existing cryptographic protocols, our proposed scheme is to be more simple, secure and efficient.
References
Prasanna Ganesan.S, “An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography” International Journal of Recent Trends in Engineering and Technology,Vol. 3, No. 2,2010.
Arvinderpal S. Wander, Nils Gura, Hans Eberle,Vipul Gupta, Sheueling Chang Shantz, “Energy Analysis of Public-Key Cryptography on Small Wireless Devices”, The IEEE PerCom 2005.
Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao,“Energy analysis of multimedia video decoding on mobile handheld devices”, Computer Standards & Interfaces Volume 32 Issue 1-2,2009.
Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao,“Power consumption analysis of audio applications on mobile handheld devices”, The IEEE TENCON 2007.
Darrel Hankerson, Julio L.opez Hernandez and Alfred Menezes, “Software Implementation of Elliptic Curve Cryptography over Binary Fields”, CHES 2000, LNCS 1965, pp. 1{24, 2000.
Harsandeep Brar, ”Performance analysis of Pointmultiplication methods for Elliptic curve cryptography”, 2008.
Finnigin.K.M, B. E. Mullins, R. A. Raines, and H. B.Potoczny, “Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks,” International Journal of Security and Networks, vol. 2, no.3/4, pp. 260-271,2006.
Ganesan R, Gobi M and Dr. Vivekanandan, ”Ellipticand Hyperelliptic Curve Cryptography Over Finite Field Fp“,i-Manager’s Journal on Software Engineering, Vol.3, Issue No.2, pp 43-48, ISSN-0973-5151,2008.
Helena Rif`a-Pous and Jordi errera-Joancomarti,”Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices”, Future Internet 3(1): 31-48, 2011.
Lauter.K, “The advantages of elliptic cryptographyfor wireless security,” IEEE Wireless Communications, pp. 62 - 67, Feb. 2006.
Marisa W. Paryasto, Kuspriyanto, Sarwono Sutiknoand Arif Sasongko,“ Issues in Elliptic Curve Cryptography Implementation”, Internetworking Indonesia Journal 2009.
Nachiketh R.Potlapally, Srivaths Ravi, Anand Raghunathan and Niraj K. Jha,“A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols”, IEEE Transactions on Mobile Computing, VOL. 5, NO. 2, FEBRUARY 2006, pages 128-143.
Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani, “Energy Consumption in Mobile Phones: A MeasurementStudy and Implications for Network Applications”,IMC’09, November 4-6, 2009, Chicago, Illinois, USA.
NeetuSettia, “Cryptanalysis of modern Cryptography Algorithms”.International Journal of Computer Science and Technology. December 2010.
Nadeem .A , “A performance comparison of data encryption algorithms”, IEEE information and communication technologies, pp.84-89, 2006.Bn.
Patroklos G. Argyroudis Raja Verma Hitesh Tewari DonalO”Mahony, “Performance Analysis of Cryptographic Protocols on Handheld Devices”, NCA 2004: 169-174.
Padma Bh, D.Chandravathi , P.Prapoorna Roja “Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method”,International Journal on Computer Science and Engineering ,Vol. 02, No. 05,2010, 1904-1907.
Prasanna Ganesan.S, “An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography”, IEEE Transactions On Mobile Computing, pages 107-109,2010.
Shanmugalakshmi.R and M.Prabu, “Research Issues on Elliptic Curve Cryptography and Its applications”,International Journal of Computer Science and Network Security, VOL.9 No.6,2009.
Wendy Chou, Dr. Lawrence Washington ,”Elliptic Curve Cryptography and Its Applications to Mobile Devices”, Proc. IEEE INFOCOM ‘04, Mar.2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2012 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.