Araştırma Makalesi
BibTex RIS Kaynak Göster

PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES

Yıl 2024, , 278 - 288, 28.06.2024
https://doi.org/10.18038/estubtda.1427488

Öz

As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions

Proje Numarası

122E517

Kaynakça

  • [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
  • [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
  • [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
  • [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
  • [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
  • [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
  • [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524. [8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
  • [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
  • [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
  • [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
  • [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
  • [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
  • [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
  • [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
  • [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
  • [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.

PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES

Yıl 2024, , 278 - 288, 28.06.2024
https://doi.org/10.18038/estubtda.1427488

Öz

As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions

Destekleyen Kurum

The Scientific and Technological Research Council of Türkiye (TÜBİTAK)

Proje Numarası

122E517

Teşekkür

This material is based upon work supported by the Scientific and Technological Research Council of Türkiye (TÜBİTAK) contract/grant number 122E517. The authors gratefully acknowledge this support and take responsibility for the contents of this report. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Scientific and Technological Research Council of Türkiye (TÜBİTAK).

Kaynakça

  • [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
  • [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
  • [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
  • [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
  • [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
  • [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
  • [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524. [8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
  • [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
  • [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
  • [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
  • [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
  • [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
  • [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
  • [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
  • [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
  • [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.
Toplam 16 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi
Bölüm Makaleler
Yazarlar

İsmet Kaan Çekiş 0009-0001-9709-0465

Armağan Toros Bu kişi benim 0009-0008-8950-7559

Nimet Apaydın 0009-0002-2110-3255

İlker Ozcelık 0000-0002-2032-1640

Proje Numarası 122E517
Yayımlanma Tarihi 28 Haziran 2024
Gönderilme Tarihi 31 Ocak 2024
Kabul Tarihi 8 Haziran 2024
Yayımlandığı Sayı Yıl 2024

Kaynak Göster

AMA Çekiş İK, Toros A, Apaydın N, Ozcelık İ. PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES. Eskişehir Technical University Journal of Science and Technology A - Applied Sciences and Engineering. Haziran 2024;25(2):278-288. doi:10.18038/estubtda.1427488