Analyzing the Resource Utilization of AES Encryption on IoT Devices

With the prosperity of the Internet of Things (IoT), the implied security issues demand heightened attention. However, conventional cryptographic security solutions often lead to heavy computations and high energy costs, which can hardly be afforded by resource-constrained IoT edge devices. Therefore, it is essential to retrieve real testing data and investigate the tradeoff between information security and its resource consumption on IoT edge devices. This paper explores the duration and energy consumption of the Advanced Encryption Standard (AES), implemented through both software and hardware with various key and buffer size settings on two resource-constrained IoT edge devices. In particular, we observe that (1) compared to software, the hardware implementation is more sensitive to buffer size settings and only consumes lower overall time and energy when the buffer size is sufficiently large; (2) the security premium provided by an increase in key size leads to increased resource consumption in all cases; and (3) comparing the two IoT boards, the CYW board, which is designed with faster default CPU clock rate and more memory, consumes fewer resources overall than the BCM board. These observations not only help advance the understanding of the trade-off between IoT devices' security needs and resource consumption, but also shed light on future improvement of light-weight security designs.

[1]  Franc Novak,et al.  HARDWARE IMPLEMENTATION OF AES ALGORITHM , 2005 .

[2]  Kris Gaj,et al.  Comparison of hardware and software implementations of selected lightweight block ciphers , 2017, 2017 27th International Conference on Field Programmable Logic and Applications (FPL).

[3]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[4]  Ingrid Verbauwhede,et al.  Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors , 2006, IEEE Transactions on Computers.

[5]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[6]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[7]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[8]  Dan Dragomir,et al.  Measuring the performance and energy consumption of AES in wireless sensor networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[9]  Behnam Dezfouli,et al.  REWIMO , 2017, ACM Trans. Sens. Networks.

[10]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[11]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[12]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[13]  Behnam Dezfouli,et al.  EMPIOT: An Energy Measurement Platform for Wireless IoT Devices , 2018, J. Netw. Comput. Appl..