Overhead of using secure wireless communications in mobile computing

Secure wireless communications are fundamental in any interaction in order to avoid security and privacy breaches, especially from mobile devices. The use of this kind of communications is far more frequent and the number of users increases day after day. This paper shows and analyzes the support, performance and consumption of cryptographic algorithms and cipher suites in terms of time and energy when secure communications (i.e., using SSL) are established according to different security levels. This study has been performed in distinct operating systems, and using different browsers and libraries.

[1]  Arun Venkataramani,et al.  Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.

[2]  Andrés Marín López,et al.  How costly are secure transactions on handheld devices? , 2013, 2013 IEEE International Conference on Consumer Electronics (ICCE).

[3]  Helena Rif Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices , 2011 .

[4]  Chris Newman,et al.  Using TLS with IMAP, POP3 and ACAP , 1999, RFC.

[5]  Ze Zhao,et al.  Design and implementation of an ASIC-based sensor device for WSN applications , 2009, IEEE Transactions on Consumer Electronics.

[6]  Eric Rescorla,et al.  HTTP Over TLS , 2000, RFC.

[7]  Vipul Gupta,et al.  The energy cost of SSL in deeply embedded systems , 2008 .

[8]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[9]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[10]  Matthew J. Fanto,et al.  Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations | NIST , 2005 .

[11]  Narseo Vallina-Rodriguez,et al.  Energy Management Techniques in Modern Mobile Handsets , 2013, IEEE Communications Surveys & Tutorials.

[12]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[13]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[14]  Jiman Park,et al.  Design and implementation of Mobile Trusted Module for trusted mobile computing , 2010, 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE).

[15]  Bodo Möller,et al.  Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .