Energy Efficient Data Encryption Techniques in Smartphones

Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing and storage. Managing security of mobile data is a necessary feature of every network and mostly encryption is used to avoid security breaches. The major challenge is that, mobile devices are very small with shortage of resources, on the other hand encryption of data requires extra energy. It is necessary to minimize energy requirements for encryption of data. For this experimental research, an android based application is developed, which optimize energy requirements for both single and double encryption techniques. AES and Blowfish encryption algorithms are used with different files sizes to test the energy requirements for single encryption, it is also examined that energy consumed by Blowfish is 119.311% more than AES. For double encryption methods, AES–Blowfish, Blowfish–AES and XTS–AES combinations of algorithms are used and energy usage is gathered. In double encryption XTS–AES consumed 13.26% less power consumption as compared to AES–Blowfish and 44.97% less then Blowfish–AES combination methods. Results of experiments revealed that AES is more energy efficient for single encryption and for double encryption XTS–AES combination requires less energy.

[1]  Rick Rogers,et al.  Android Application Development - Programming with the Google SDK , 2009 .

[2]  Yuanyuan Zhang,et al.  Clustering Mobile Apps Based on Mined Textual Features , 2016, ESEM.

[3]  Tao Zhang,et al.  Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications , 2015, Secur. Commun. Networks.

[4]  Khairulmizam Samsudin,et al.  A framework for GPU-accelerated AES-XTS encryption in mobile devices , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.

[5]  Birgit Pfitzmann,et al.  Trusting Mobile User Devices and Security Modules , 1997, Computer.

[6]  Ingrid Moerman,et al.  A survey on wireless body area networks , 2011, Wirel. Networks.

[7]  Johannes Götzfried,et al.  ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices , 2013, 2013 International Conference on Availability, Reliability and Security.

[8]  Luther Martin,et al.  XTS: A Mode of AES for Encrypting Hard Disks , 2010, IEEE Security & Privacy.

[9]  Garth V. Crosby,et al.  Advances and challenges of wireless body area networks for healthcare applications , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[10]  Ramesh Karri,et al.  Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..

[11]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.

[12]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[13]  Morris J. Dworkin SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .

[14]  William Stallings,et al.  Cryptography and network security , 1998 .

[15]  Benjamin Halpert Mobile device security , 2004, InfoSecCD '04.

[16]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[17]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[18]  Sangwon Lee,et al.  Wireless Body Area Networks: Where does energy go? , 2012, 2012 IEEE International Symposium on Workload Characterization (IISWC).

[19]  M. Umaparvathi,et al.  Evaluation of symmetric encryption algorithms for MANETs , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.