An Energy Efficient Protocol For The Internet Of Things

Abstract The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

[1]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[2]  Egidijus Kazanavičius,et al.  Securing Web Application by Embedded Firewall , 2012 .

[3]  Egidijus Kazanavičius,et al.  SECURITY METHOD OF EMBEDDED SOFTWARE FOR MECHATRONIC SYSTEMS , 2012 .

[4]  Jasbir S. Arora,et al.  Survey of multi-objective optimization methods for engineering , 2004 .

[5]  Vipul Gupta,et al.  The energy cost of SSL in deeply embedded systems , 2008 .

[6]  Algimantas Venckauskas,et al.  Generation of the Secret Encryption Key Using the Signature of the Embedded System , 2012, Inf. Technol. Control..

[7]  Phuoc Tran-Gia,et al.  Future Internet research and experimentation: The G-Lab approach , 2014, Comput. Networks.

[8]  Srivaths Ravi,et al.  Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution , 2007, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[9]  Vytautas Štuikys,et al.  Energy Efficiency Comparison with Cipher Strength of AES and Rijndael Cryptographic Algorithms in Mobile Devices , 2011 .

[10]  Maria-Dolores Cano,et al.  A secure energy-efficient m-banking application for mobile devices , 2011, J. Syst. Softw..

[11]  Yuval Levin Imagining the future. , 2004, New Atlantis.

[12]  Michel Riveill,et al.  Designing Security Protocols Adapted to the Constraints of Mobile Environments , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[13]  Prashant Krishnamurthy,et al.  On a framework for energy-efficient security protocols in wireless networks , 2004, Comput. Commun..

[14]  Feng Zhao,et al.  Virtual machine power metering and provisioning , 2010, SoCC '10.