Research Article
BibTex RIS Cite

PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES

Year 2024, , 278 - 288, 28.06.2024
https://doi.org/10.18038/estubtda.1427488

Abstract

As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions

Project Number

122E517

References

  • [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
  • [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
  • [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
  • [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
  • [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
  • [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
  • [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524. [8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
  • [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
  • [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
  • [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
  • [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
  • [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
  • [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
  • [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
  • [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
  • [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.

PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES

Year 2024, , 278 - 288, 28.06.2024
https://doi.org/10.18038/estubtda.1427488

Abstract

As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions

Supporting Institution

The Scientific and Technological Research Council of Türkiye (TÜBİTAK)

Project Number

122E517

Thanks

This material is based upon work supported by the Scientific and Technological Research Council of Türkiye (TÜBİTAK) contract/grant number 122E517. The authors gratefully acknowledge this support and take responsibility for the contents of this report. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Scientific and Technological Research Council of Türkiye (TÜBİTAK).

References

  • [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
  • [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
  • [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
  • [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
  • [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
  • [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
  • [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524. [8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
  • [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
  • [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
  • [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
  • [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
  • [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
  • [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
  • [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
  • [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
  • [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.
There are 16 citations in total.

Details

Primary Language English
Subjects Information Security Management
Journal Section Articles
Authors

İsmet Kaan Çekiş 0009-0001-9709-0465

Armağan Toros This is me 0009-0008-8950-7559

Nimet Apaydın 0009-0002-2110-3255

İlker Ozcelık 0000-0002-2032-1640

Project Number 122E517
Publication Date June 28, 2024
Submission Date January 31, 2024
Acceptance Date June 8, 2024
Published in Issue Year 2024

Cite

AMA Çekiş İK, Toros A, Apaydın N, Ozcelık İ. PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES. Eskişehir Technical University Journal of Science and Technology A - Applied Sciences and Engineering. June 2024;25(2):278-288. doi:10.18038/estubtda.1427488