Abstract
The computational effort required to guarantee the security of a communication, due to the complexity of the cryptographic algorithms, heavily influences the energy consumption and consequently the energy demand of the involved parties. This energy request makes secure communication with low energy consumption a non-trivial issue. The aim of this work is to study, as well as evaluate, the way in which the cryptographic primitives used in secure communication protocols affect the workload of the CPU and, therefore, the energy expenditure of the interacting devices. Through the aforementioned analysis, attention will be focused on the need to consider with greater sensitivity the possibility of operating/undergoing cyber-attacks using the power consumption induced by secure communications. The main focus is to exaggerate the workload of the target devices in order to produce the maximum energy consumption and have a kind of Denial-of-Service attack. The paper studies the contribution of energy consumption introduced by the different part of “secure” primitives within the TLS protocol. As a conclusion, it is shown how Cryptography is often used not in the proper way, i.e., it may introduce costs that are sometimes higher than the value of the “goods” to protect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: 9th ACM SIGCOMM Conference on Internet Measurement, pp. 280–293 (2009)
Bernard, V.: TLS & Perfect Forward Secrecy (online). https://vincent.bernat.ch/en/blog/2011-ssl-perfect-forward-secrecy
Castiglione, A., Palmieri, F., Fiore, U., Castiglione, A., De Santis, A.: Modeling energy-efficient secure communication in multi-mode wireless mobile device. J. Comput. Syst. Sci. 81, 1464–1478 (2015)
Castro-Castilla, A.: Traffic Analysis of an SSL/TLS Session (online)
Chang, J.K.-T., Liu, C., Gaudiot, J.-L.: Hardware acceleration for cryptography algorithms by hotspot detection. In: Park, J.J.J.H., Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 472–481. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38027-3_50
DelBello, C., Raihan, K., Zhang, T.: Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. Secur. Commun. Netw. 8(17), 2973–2980 (2015)
Gerez, A.H., Kamaraj, K., Nofal, R., Liu, Y., Dezfouli, B.: Energy and processing demand analysis of TLS protocol in internet of things applications. In: IEEE Workshop on Signal Processing System (2018)
Hardjono, T., Dondeti, L.: Security in Wireless LANs and MANs. Artech House (2005)
Jain, A., Bhatnagar, D.: Comparative study of symmetric key encryption algorithms. Int. J. Comput. Sci. Netw. 3(5), 298–303 (2014)
Jakobsson, M., Pointcheval, D.: Mutual authentication for low-power mobile devices. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 178–195. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46088-8_17
Karri, R., Mishra, P.: Minimizing energy consumption of secure wireless session with QoS constraints. In: IEEE International Conference on Communication, pp. 2053–2057 (2002)
Kim, J.M., Lee, H.S., Yi, J., Park, M.: Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks. J. Sens. 2016, 1–9 (2016). https://doi.org/10.1155/2016/2678269
Kolamunna, H., et al.: Are wearable devices ready for secure and direct internet communication. GetMob. Mob. Comput. Commun. 21(3), 5–10 (2017)
Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN. Secur. Commun. Netw. 2018, 1–14 (2018). https://doi.org/10.1155/2018/5087065
Law, Y., Dulman, S., Etalle, S., Havinga, P.J.: Assessing Security-Critical Energy-Efficient Sensor Networks. Centre for Telematics and Information Technology (2002)
de Meulenaer, G., Gosset, F., Standaert, F., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2008)
Naylor, D., et al.: The cost of the “S” in HTTPS. In: 10th ACM International Conference on Emerging Networking Experiments and Technologies, pp. 133–140 (2014)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128–143 (2006)
Potlapally, N.R., Ravi, S., Raghunathan, A., Lakshminarayana, G.: Optimizing public-key encryption for wireless clients. In: IEEE International Conference on Communications, vol. 2, pp. 1050–1056 (2002)
Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: IEEE Design Automation Conference, pp. 772–782 (2002)
Rescorla, E.: SSL/TLS and Computational DoS (online)
Ristić, I.: Bulletproof SSL and TLS. Feisty Duck (2014)
Salama, D., Kader, H., Hadhoud, M.: Studying the effect of most common encryption algorithms. Int. Arab J. e-Technol. 2(1), 1–10 (2011)
Singelee, D., Seys, S., Batina, L., Verbauwhede, I.: The communication and computation cost of wireless security. In: 4th ACM Conference on Wireless Network Security, pp. 1–4, June 2011
Song, J., Miller, L.: Empirical analysis of the mobility factor for the random waypoint model. In: OPNETWORK, pp. 600–700 (2002)
Wong, D., Chan, A.: Mutual authentication and key exchange for low power wireless communications. In: MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Castaldo, M., Castiglione, A., Masucci, B., Nappi, M., Pero, C. (2020). Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-4825-3_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4824-6
Online ISBN: 978-981-15-4825-3
eBook Packages: Computer ScienceComputer Science (R0)