Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications

Transport Layer Security (TLS) is the de-facto protocol for secure communication in Internet of Things (IoT) applications. However, the processing and energy demands of this protocol are two essential parameters that must be taken into account with respect to the resource-constraint nature of IoT devices. In this paper, we study the resource consumption of the TLS handshake using a testbed in which an IoT board (Cypress CYW43907) communicates with a Raspberry Pi server over an 802.11 wireless link. Although TLS supports a wide-array of encryption algorithms, we focus on the performance of TLS using three of the most popular and robust cipher suites. Our experiments show that ciphers using Elliptic Curve Diffie Hellman (ECDHE) key exchange are considerably more efficient than ciphers using Diffie Hellman (DHE). Furthermore, ECDSA signature verification consumes more time and energy than RSA signature verification given ECDHE key exchange. The studies of this paper help IoT designers choose an appropriate TLS cipher suite based on application demands, computational capabilities, and available energy resources.

[1]  A. Emdadi,et al.  Implementing the TLS Protocol on a Bare PC , 2010, 2010 Second International Conference on Computer Research and Development.

[2]  Ali Ahmed,et al.  Internet of Things: An end-to-end security layer , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[3]  Matti Siekkinen,et al.  TLS and energy consumption on a mobile device: A measurement study , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[4]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[5]  Kenneth G. Paterson,et al.  Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Behnam Dezfouli,et al.  EMPIOT: An Energy Measurement Platform for Wireless IoT Devices , 2018, J. Netw. Comput. Appl..

[7]  Michael Atighetchi,et al.  Safe configuration of TLS connections , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[8]  Abhijit Choudhury,et al.  AES Galois Counter Mode (GCM) Cipher Suites for TLS , 2008, RFC.

[9]  Mohamed Abid,et al.  Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.

[10]  Debanjan Saha,et al.  Transport layer security: how much does it really cost? , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[11]  Dan Boneh,et al.  An Experimental Study of TLS Forward Secrecy Deployments , 2014, IEEE Internet Computing.

[12]  Habib-ur Rehman,et al.  Future applications and research challenges of IOT , 2017, 2017 International Conference on Information and Communication Technologies (ICICT).

[13]  Behnam Dezfouli,et al.  REWIMO , 2017, ACM Trans. Sens. Networks.

[14]  Anantha Chandrakasan,et al.  An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications , 2018, 2018 IEEE International Solid - State Circuits Conference - (ISSCC).

[15]  Shay Gueron,et al.  Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.

[16]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[17]  Quan Zhang,et al.  Improved TLS Handshake Protocols Using Identity-Based Cryptography , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[18]  Vijay Kumar,et al.  Security analysis of TLS authentication , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[19]  Raghu Kacker,et al.  TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS).

[20]  Behnam Dezfouli,et al.  Mobility-aware real-time scheduling for low-power wireless networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.