ResearchSpace

Performance costs of cryptography in securing new-generation Internet of Energy endpoint devices

Show simple item record

dc.contributor.author Ledwaba, Lehlogonolo PI
dc.contributor.author Hancke, GP
dc.contributor.author Venter, HS
dc.contributor.author Isaac, Sherrin J
dc.date.accessioned 2018-05-14T12:15:43Z
dc.date.available 2018-05-14T12:15:43Z
dc.date.issued 2018-01
dc.identifier.citation Ledwaba, L.P.I. et al. 2018. Performance costs of cryptography in securing new-generation Internet of Energy endpoint devices. IEEE Access, vol. 6: 9303-9323 en_US
dc.identifier.issn 2169-3536
dc.identifier.uri http://ieeexplore.ieee.org/document/8258990/
dc.identifier.uri DOI: 10.1109/ACCESS.2018.2793301
dc.identifier.uri http://hdl.handle.net/10204/10203
dc.description This is an open access article. en_US
dc.description.abstract In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8-bit and 16-bit microcontroller units (MCUs). Previous attempts at implementing cryptographic services on wireless sensor nodes have resulted in high power consumptions, long operating times and the depletion of memory resources. Over the last decade, however, processors for the IoT and IoE have improved; with increased operating power and memory resources, longer data bus widths and low power consumption. With the improvements made to processors suitable for building IoT devices, the question remains whether endpoint nodes should still be considered capable of only supporting the most lightweight of cryptographic mechanisms. We evaluate the capabilities of a device family (Cortex-M series processors) commonly found in programmable logic controllers (PLC) to implement standard, verified software cryptographic libraries in terms of execution times, memory occupation and power consumption in order to determine their adequacy for use in smart grid applications. It was seen that the MCUs were easily capable of running standard cryptographic algorithms. However, the use of public key cryptography may still require the inclusion of a hardware crypto accelerator or the use of a secure MCU implementing public key cryptography; as the relatively long execution times seen during the operation of, for example, ECDSA could be intolerable within a real time, IoE application. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Worklist;19996
dc.subject Industrial Internet of Things en_US
dc.subject Internet of Energy en_US
dc.subject Embedded security en_US
dc.subject Smart grid en_US
dc.title Performance costs of cryptography in securing new-generation Internet of Energy endpoint devices en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record