Documente Academic
Documente Profesional
Documente Cultură
, 2014
http://dx.doi.org/
C a m k b
(2)
C
const (3)
m kb
max U wE (1 w) S (1) Then for any available energy budget value Cbudget we
can calculate a key size of a cryptographic algorithm,
where w is a weighting factor representing user which can be used to encode a message within energy
preference on energy and security, respectively. constraints as follows:
The energy and security metrics allow to calculate how
much protection a security mechanism (cryptographic 1
Cbudget bchar
algorithm) can provide and how much battery capacity k (6)
(lifetime) will be reduced by using given security achar m
mechanism.
Given the same security strength and energy constraint, As key size is usually defined in terms of power values
the key factor is the selection of the cryptographic of 2, we rewrite Eq. 6 as follows:
algorithm that satisfies both energy and security constrains.
Given the energy-security trade-off function, the best 1
log Cbudget char
b
security parameters can be calculated according to the 2
a m
char
system requirements to achieve the best trade-off between k 2
energy consumption and security strength.
(7)
With the defined energy metric E and security metric
S , the system requirements can be formulated We claim that Eq. 7 can be used as energy-security
quantitatively. However, both metrics are related, because trade-off model to calculate available values of security
a more secure cryptographic algorithm usually requires parameters (i.e., key size) of cryptographic applications
more computations, which in turn leads to higher energy within available energy budget.
consumption. However, reliability of such model depends upon model
Evaluation of security of cryptographic algorithm is a of battery capacity measurement, which is considered next.
complex problem, because security usually means ability to
withstand an attack, which is difficult to evaluate. In IV. MODEL OF BATTERY CAPACITY MEASUREMENT
practice, key size in bits can be used as approximate
Many different battery lifetime models have been
measure of security strength.
proposed (see, e.g., [3, 9]). Most of these models have been
We assume that key size k, message length m and battery
developed for use in variety areas.
capacity drain ΔC for a cryptography algorithm is related
as follows: The state of the battery capacity Cused is a time-
ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. , NO. , 2014
VI. EVALUATION
The experimental results (see Figs. 4-5) show that RSA
and DSA are most energy-efficient symmetric
Fig. 2. Battery capacity drain (mAh/MB) for symmetric cryptography
algorithms. cryptographic algorithms, while AES and Camelia are most
energy efficient asymmetric algorithms of the analysed
Fig. 2 shows average battery capacity drain in mAh per ones. The results correspond well to the study reported in
message MB for symmetric cryptography algorithms, while [12].
Fig. 3 shows the same for asymmetric cryptography We use the experimental results to evaluate the energy-
algorithms. security trade-off model proposed in Section III. The
ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. , NO. , 2014
calculated characteristic model values (using Eq. 4) are algorithms is very much dependent on the key size of the
presented in Table 1. algorithm, while energy consumption of symmetric
Our experimental results correspond well to the results algorithms is not affected to the same extent by the key
presented in [11]. The energy cost of asymmetric size. This conclusion is confirmed by the results of other
algorithms is very much dependent on the key size (the authors.
value of the key size exponent parameter value bchar 1 ), 4) The results of the paper can be used by other
while that of symmetric algorithms is not affected to the researchers to evaluate energy-efficiency of designed
network and data security protocols and applications.
same extent by the key size ( bchar 1 ). The reason is that
only a part of a symmetric algorithm, i.e., key set-up (key ACKNOWLEDGEMENT
expansion) depends upon key size. Therefore, as
requirements for security strength increase, asymmetric The authors wish to thank G. Grigaravicius for his
cryptography algorithms become more energy-hungry than valuable efforts in recording the experimental data.
symmetric algorithms (also noted in [11, 12]).
REFERENCES
Table 1. Characteristic values of the proposed energy-security trade-off
model for cryptography algorithms [1] H. Yu; N. Powell; D. Stembridge; X. Yuan, “Cloud Computing and
Security Challenges”, in Proc. of the 50th Annual Southeast Regional
Algorithm RSD Conference (ACM SE 12), Tuscaloosa, AL, USA, 2012, pp. 298–302.
Exponent of key size ( bchar ) [2] A. Armando; G. Costa; A. Merlo, “Bring Your Own Device,
Symmetric cryptography Securely”, in Proc. of the 28th Annual ACM Symposium on Applied
RSA 2.51 0.0047 Computing (SAC ’13), Coimbra, Portugal, 2013, pp. 1852–1858.
DSA 1.52 0.0035 [3] N. Korhonen, “Predicting mobile device battery life”, M.S. thesis,
ECDSA 2.36 0.0119 Aalto University, Finland, 2011.
ElGamal 3.08 0.0246 [4] A. Rahmati, A. Qian, L. Zhong, “Understanding human-battery
Assymetric cryptography interaction on mobile phones”, in Proc. of the 9th Int. Conference on
AES 0.35 0.0030 Human Computer Interaction with Mobile Devices and Services
RC4 0 0.0159 (MobileHCI '07), Singapore, 2007, 265-272.
[5] N. Fotiou, G. F. Marias, G. C. Polyzos, P. Szalachowski, Z. Kotulski,
Camellia 0.31 0.0475
M. Niedermeier, X. He, H. De Meer, “Towards adaptable security for
Serpent 0.03 0.0116
energy efficiency in wireless sensor networks”, in Proc. of the 28th
meeting of the Wireless World Research Forum (WWRF 2012),
Finally, we also can use the proposed model to calculate Athens, Greece, 2012, 1-6.
[6] C. Krintz, Y. Wen, R. Wolski, “Application-level prediction of battery
the value of the security parameter (i.e., key size) of the dissipation”, in Symposium on Low Power Electronics and Design
cryptography application given the available energy budget (ISLPED'04), Newport Beach, CA, USA, 2004, 224-229.
of the mobile device (see Eq. 7). [7] R. Damasevicius; V. Stuikys; J. Toldinas, “Methods for measurement
of energy consumption in mobile devices”, Metrology and
Measurement Systems, Vol. 20, no. 3, 2013, 419-430.
VII. CONCLUSIONS [8] K.C. Kang, J. Lee, P. Donohoe, “Feature-Oriented Product Line
Engineering”, IEEE Software, 2002, 19(4), 58–65.
1) We have proposed the theoretical energy-security [9] M. R. Jongerden, Model-based energy analysis of battery powered
trade-off model for describing relationship between energy systems, Ph.D. dissertation, University of Twente, the Netherlands,
consumption and security strength of cryptographic 2010.
[10] W. Zeng; M.-Y. Chow, "A trade-off model for performance and
algorithms. security in secured Networked Control Systems," in Proc. of IEEE
2) We have performed analysis and experimental Int. Symposium on Industrial Electronics (ISIE), 2011, 1997-2002.
[11] N. R. Potlapally, S. Ravi, A. Raghunathan, N. K. Jha, “Analyzing the
research of energy concumption of symmetric and energy consumption of security protocols”, in Proc. of 2003 Int.
asymmetric cryptography algorithms. Symp. on Low Power Electronics and Design (ISLPED'03), ACM,
3) We have validated the theoretical energy-security New York, NY, USA, 30-35.
[12] H. Rifà-Pous, J. Herrera-Joancomartí, „Computational and Energy
trade-off model with our experimental data. The results Costs of Cryptographic Algorithms on Handheld Devices”, Future
show that the energy consumption of asymmetric Internet 2011, 3, 31-48.