Author:
Silva Catarina,Cunha Vitor A.,Barraca João P.,Aguiar Rui L.
Abstract
AbstractThe advances on recent communication paradigms brings new security and privacy challenges, mainly about personal data collection by smart devices. Resource constrained devices face serious issues to run complex cryptographic algorithms. Trying to evaluate the performance impact of those algorithms in usual and common devices used in smart homes, in this paper we tested the impact of different cryptographic algorithms in low computational devices, typically used in smart devices applied in smart homes, testing different security configurations and using the two most used transport protocols (HTTP and MQTT). The experiment measures their effects on six commonly used embedded devices in IoT WSNs: ESP8622, ESP32, and Raspberry Pi (RPi) from 1 to 4. The experiment measured the power consumption, message delay, and additional message length (bytes). Moreover, the analysis was also used to model security algorithms. The experimental results from long runs (72 hours) reveal the cryptographic solution choice is significant for the message delay and additional message length.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference45 articles.
1. Abu-Tair, M., Djahel, S., Perry, P., et al. (2020). Towards secure and privacy-preserving IoT enabled smart home: architecture and experimental study. Sensors, 20(21), 6131.
2. Ahmed, A. A. (2021). Lightweight digital certificate management and efficacious symmetric cryptographic mechanism over industrial internet of things. Sensors, 21(8), 2810.
3. Alavi, A. H., Jiao, P., Buttlar, W. G., et al. (2018). Internet of things-enabled smart cities: State-of-the-art and future trends. Measurement, 129, 589–606.
4. AlHammadi, A., AlZaabi, A., AlMarzooqi, B., et al. (2019) Survey of iot-based smart home approaches. In: ASET, pp. 1–6
5. Bandyopadhyay, S., & Bhattacharyya, A. (2013). Lightweight internet protocols for web enablement of sensors using constrained gateway devices. 2013 International Conference on Computing (pp. 334–340). IEEE: Networking and Communications (ICNC).