Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node

The Internet of Things will include many resource-constrained wireless sensing devices, hungry for energy, bandwidth and compute cycles. The sheer amount of devices involved will require new solutions to handle issues such as identification and power provisioning. In this contribution, we analyze the energy needs of several public-key based authentication protocols, taking into account the energy cost of communication as well as of computation. We have built an autonomous, energy-harvesting sensor node which includes a micro-controller, RF-unit, and energy harvester. We investigate the Elliptic Curve Digital Signature Algorithm (ECDSA), the Lamport-Diffie one-time hash-based signature scheme (LD-OTS) and the Winternitz one-time hash-based signature scheme (W-OTS). We demonstrate that there’s a trade-off between energy used for communication, energy used for computation, and security level. However, when we consider the energy needs for the overall system, we show that all schemes are within one order of magnitude from each another.

[1]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[2]  Chiara Petrioli,et al.  Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? , 2013, NDSS.

[3]  Mani B. Srivastava,et al.  Design considerations for solar energy harvesting wireless embedded systems , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Khaled Elleithy,et al.  Innovations and Advances in Computer, Information, Systems Sciences, and Engineering , 2013 .

[5]  Julien Penders,et al.  Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.

[6]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[7]  Christof Paar,et al.  Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures , 2013, RFIDSec.

[8]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[9]  Paul K. Wright,et al.  Vibration Powered Battery-Assisted Passive RFID Tag , 2005, EUC Workshops.

[10]  Norbert Felber,et al.  Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices , 2010, WISA.

[11]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[12]  Nigel P. Smart,et al.  Hash Based Digital Signature Schemes , 2005, IMACC.

[13]  Timothy C. Green,et al.  Energy Harvesting From Human and Machine Motion for Wireless Electronic Devices , 2008, Proceedings of the IEEE.

[14]  Christof Paar,et al.  Fast Hash-Based Signatures on Constrained Devices , 2008, CARDIS.

[15]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[16]  Michael Hutter,et al.  Elliptic Curve Cryptography on the WISP UHF RFID Tag , 2011, RFIDSec.

[17]  Dan Komosny,et al.  Energy Efficient Public Key Cryptography in Wireless Sensor Networks , 2013 .

[18]  Dong Sam Ha,et al.  A self-powered power management circuit for energy harvested by a piezoelectric cantilever , 2010, 2010 Twenty-Fifth Annual IEEE Applied Power Electronics Conference and Exposition (APEC).

[19]  Patrick Schaumont,et al.  Energy-Architecture Tuning for ECC-Based RFID Tags , 2013, RFIDSec.

[20]  Kevin Fu,et al.  Mementos: system support for long-running computation on RFID-scale devices , 2011, ASPLOS XVI.

[21]  Johannes Buchmann,et al.  Hash-based Digital Signature Schemes , 2009 .

[22]  Erich Wenger,et al.  Evaluating 16-Bit Processors for Elliptic Curve Cryptography , 2011, CARDIS.

[23]  David Wetherall,et al.  Dewdrop: An Energy-Aware Runtime for Computational RFID , 2011, NSDI.