Abstract

Modern business information technologies, such as Cloud computing and Bring Your Own Device (BYOD) raise new requirements for end node security. Cryptographic algorithms must be used to ensure security of business data and communications. However, data encryption decreases battery lifetime on mobile devices such as smartphones or tablet PCs. In this paper, we provide an analysis of energy consumption characteristics of cryptographic algorithms from Bouncy Castle Crypto API. We propose a cryptography-oriented energy-security trade-off model and use it to evaluate energy-efficiency of cryptographic algorithms. DOI: http://dx.doi.org/10.5755/j01.eee.20.5.7118

Highlights

  • Revolutionary growth of hardware capabilities combined with increasingly small size and low weight brings many opportunities for using mobile devices, such as smart phones, laptops, and tablet PCs, for business and entertainment at home, in airport, at office, i.e., everywhere and everywhen

  • In this paper we investigate the influence of the cryptographic algorithms workload on the battery lifetime

  • As requirements for security strength increase, asymmetric cryptography algorithms become more energy-hungry than symmetric algorithms

Read more

Summary

INTRODUCTION

Revolutionary growth of hardware capabilities combined with increasingly small size and low weight brings many opportunities for using mobile devices, such as smart phones, laptops, and tablet PCs, for business and entertainment at home, in airport, at office, i.e., everywhere and everywhen. Security of confidential business information is a matter of concern Companies and their employees must have assurance that information, which is being downloaded and saved on a mobile device, will be accessed only by an authorized user. This requires securing of both data storage and communication and on mobile devices regardless of how the users access information [3]. A mobile device should use the minimum energy level possible while at the same time ensuring the acceptable level of security. The prediction of the battery lifetime is possible only when the behaviour of the battery can be modelled reliably so that the users could decide themselves how to use the available battery time in a most effective and secure way.

ENERGY-SECURITY TRADE-OFF MODEL
MODEL OF BATTERY CAPACITY MEASUREMENT
CASE STUDY AND EXPERIMENTAL RESULTS
EVALUATION
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call