Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity | SpringerLink
Skip to main content

Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2019)

Abstract

The computational effort required to guarantee the security of a communication, due to the complexity of the cryptographic algorithms, heavily influences the energy consumption and consequently the energy demand of the involved parties. This energy request makes secure communication with low energy consumption a non-trivial issue. The aim of this work is to study, as well as evaluate, the way in which the cryptographic primitives used in secure communication protocols affect the workload of the CPU and, therefore, the energy expenditure of the interacting devices. Through the aforementioned analysis, attention will be focused on the need to consider with greater sensitivity the possibility of operating/undergoing cyber-attacks using the power consumption induced by secure communications. The main focus is to exaggerate the workload of the target devices in order to produce the maximum energy consumption and have a kind of Denial-of-Service attack. The paper studies the contribution of energy consumption introduced by the different part of “secure” primitives within the TLS protocol. As a conclusion, it is shown how Cryptography is often used not in the proper way, i.e., it may introduce costs that are sometimes higher than the value of the “goods” to protect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: 9th ACM SIGCOMM Conference on Internet Measurement, pp. 280–293 (2009)

    Google Scholar 

  2. Bernard, V.: TLS & Perfect Forward Secrecy (online). https://vincent.bernat.ch/en/blog/2011-ssl-perfect-forward-secrecy

  3. Castiglione, A., Palmieri, F., Fiore, U., Castiglione, A., De Santis, A.: Modeling energy-efficient secure communication in multi-mode wireless mobile device. J. Comput. Syst. Sci. 81, 1464–1478 (2015)

    Article  MathSciNet  Google Scholar 

  4. Castro-Castilla, A.: Traffic Analysis of an SSL/TLS Session (online)

    Google Scholar 

  5. Chang, J.K.-T., Liu, C., Gaudiot, J.-L.: Hardware acceleration for cryptography algorithms by hotspot detection. In: Park, J.J.J.H., Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 472–481. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38027-3_50

    Chapter  Google Scholar 

  6. DelBello, C., Raihan, K., Zhang, T.: Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. Secur. Commun. Netw. 8(17), 2973–2980 (2015)

    Article  Google Scholar 

  7. Gerez, A.H., Kamaraj, K., Nofal, R., Liu, Y., Dezfouli, B.: Energy and processing demand analysis of TLS protocol in internet of things applications. In: IEEE Workshop on Signal Processing System (2018)

    Google Scholar 

  8. Hardjono, T., Dondeti, L.: Security in Wireless LANs and MANs. Artech House (2005)

    Google Scholar 

  9. Jain, A., Bhatnagar, D.: Comparative study of symmetric key encryption algorithms. Int. J. Comput. Sci. Netw. 3(5), 298–303 (2014)

    Google Scholar 

  10. Jakobsson, M., Pointcheval, D.: Mutual authentication for low-power mobile devices. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 178–195. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46088-8_17

    Chapter  Google Scholar 

  11. Karri, R., Mishra, P.: Minimizing energy consumption of secure wireless session with QoS constraints. In: IEEE International Conference on Communication, pp. 2053–2057 (2002)

    Google Scholar 

  12. Kim, J.M., Lee, H.S., Yi, J., Park, M.: Power adaptive data encryption for energy-efficient and secure communication in solar-powered wireless sensor networks. J. Sens. 2016, 1–9 (2016). https://doi.org/10.1155/2016/2678269

  13. Kolamunna, H., et al.: Are wearable devices ready for secure and direct internet communication. GetMob. Mob. Comput. Commun. 21(3), 5–10 (2017)

    Article  Google Scholar 

  14. Lara-Nino, C.A., Diaz-Perez, A., Morales-Sandoval, M.: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN. Secur. Commun. Netw. 2018, 1–14 (2018). https://doi.org/10.1155/2018/5087065

  15. Law, Y., Dulman, S., Etalle, S., Havinga, P.J.: Assessing Security-Critical Energy-Efficient Sensor Networks. Centre for Telematics and Information Technology (2002)

    Google Scholar 

  16. de Meulenaer, G., Gosset, F., Standaert, F., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2008)

    Google Scholar 

  17. Naylor, D., et al.: The cost of the “S” in HTTPS. In: 10th ACM International Conference on Emerging Networking Experiments and Technologies, pp. 133–140 (2014)

    Google Scholar 

  18. Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128–143 (2006)

    Article  Google Scholar 

  19. Potlapally, N.R., Ravi, S., Raghunathan, A., Lakshminarayana, G.: Optimizing public-key encryption for wireless clients. In: IEEE International Conference on Communications, vol. 2, pp. 1050–1056 (2002)

    Google Scholar 

  20. Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: IEEE Design Automation Conference, pp. 772–782 (2002)

    Google Scholar 

  21. Rescorla, E.: SSL/TLS and Computational DoS (online)

    Google Scholar 

  22. Ristić, I.: Bulletproof SSL and TLS. Feisty Duck (2014)

    Google Scholar 

  23. Salama, D., Kader, H., Hadhoud, M.: Studying the effect of most common encryption algorithms. Int. Arab J. e-Technol. 2(1), 1–10 (2011)

    Google Scholar 

  24. Singelee, D., Seys, S., Batina, L., Verbauwhede, I.: The communication and computation cost of wireless security. In: 4th ACM Conference on Wireless Network Security, pp. 1–4, June 2011

    Google Scholar 

  25. Song, J., Miller, L.: Empirical analysis of the mobility factor for the random waypoint model. In: OPNETWORK, pp. 600–700 (2002)

    Google Scholar 

  26. Wong, D., Chan, A.: Mutual authentication and key exchange for low power wireless communications. In: MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiara Pero .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Castaldo, M., Castiglione, A., Masucci, B., Nappi, M., Pero, C. (2020). Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4825-3_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4824-6

  • Online ISBN: 978-981-15-4825-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics