Energy analysis of the AAβ lightweight asymmetric encryption scheme on an embedded device

Lightweight cryptography offers energy-efficient cryptographic capabilities on low powered devices such as those commonly found in the Internet of Things (IoT). One such lightweight scheme is the AA-Beta (AAß) asymmetric cryptographic scheme which is based on the Diophantine Equation Hard Problem (DEHP) and whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption process. In a previous work we have shown that the implementation of the AAß scheme on a Raspberry-Pi (embedded) platform produced a remarkable timing improvement for the encryption and decryption of messages when compared to previous trials on a numeric computing environment. In this paper, we present the energy analysis of running the AAß scheme over Raspbian OS on the Raspberry Pi 2 device. We compare the energy consumptions for encryption and decryption using the AAß scheme with similar processes using the Textbook Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) scheme on the aforesaid platform. The AAß asymmetric encryption process demonstrates a significantly lower energy consumption compared to RSA, whereby as much as 400 times less energy was used by AAß when encrypting messages while considerable energy savings were also seen during AAß message decryption. We conclude that the AAß encryption scheme is a cryptographic scheme with a great potential for deployment on low powered devices, offering fast and energy-efficient asymmetric cryptographic capabilities to all devices.

[1]  Mary R. Schurgot,et al.  Experiments with security and privacy in IoT networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[2]  Helena Rif Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices , 2011 .

[3]  Zhong Chen,et al.  C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[4]  Iti Saha Misra,et al.  Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[5]  Xiaojiang Du,et al.  A light-weight certificate-less public key cryptography scheme based on ECC , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[6]  Jiri Hosek,et al.  On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.

[7]  Qasem Abu Al-Haija,et al.  A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks , 2014, FNC/MobiSPC.

[8]  Edward David Moreno,et al.  Asymmetric Encryption in Wireless Sensor Networks , 2012 .

[9]  M. R. K. Ariffin A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q , 2013 .

[10]  Rohit Moghe,et al.  A Low-Cost Electric Field Energy Harvester for an MV/HV Asset-Monitoring Smart Sensor , 2015 .

[11]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[12]  Habibah Hashim,et al.  Simulation of RSA and ElGamal encryption schemes using RF simulator , 2015, 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).

[13]  Habibah Hashim,et al.  Implementation of the Aa-Beta (AAβ) lightweight asymmetric encryption scheme on an embedded system device , 2016 .

[14]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[15]  Jong Min Kim,et al.  Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.

[16]  Teddy Mantoro,et al.  Comparison between RSA hardware and software implementation for WSNs security schemes , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[17]  Habibah Hashim,et al.  Timing analysis of the lightweight AAβ encryption scheme on embedded Linux for Internet of Things , 2016, 2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).

[18]  AnnapoornaShetty,et al.  A Review on Asymmetric Cryptography RSA and ElGamal Algorithm , 2014 .

[19]  Younghwan Yoo,et al.  MIMO-HFM: Acoustic system design for reliability and high data rate in underwater sensor networks , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).

[20]  Paul Gratz,et al.  Energy-efficient implementations of GF (p) and GF(2m) elliptic curve cryptography , 2015, 2015 33rd IEEE International Conference on Computer Design (ICCD).

[21]  Z. Mahad,et al.  AAβ public key cryptosystem - A comparative analysis against RSA and ECC , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[22]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[23]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.

[24]  Amrit Iyer,et al.  A low-cost electric-field energy harvester for an MV/HV asset-monitoring smart-sensor , 2013, 2013 IEEE Energy Conversion Congress and Exposition.