PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES
Yıl 2024,
Cilt: 25 Sayı: 2, 278 - 288, 28.06.2024
İsmet Kaan Çekiş
,
Armağan Toros
Nimet Apaydın
,
İlker Ozcelık
Öz
As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions
Kaynakça
- [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
- [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
- [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
- [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
- [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
- [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
- [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524.
[8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
- [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
- [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
- [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
- [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
- [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
- [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
- [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
- [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
- [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.
PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES
Yıl 2024,
Cilt: 25 Sayı: 2, 278 - 288, 28.06.2024
İsmet Kaan Çekiş
,
Armağan Toros
Nimet Apaydın
,
İlker Ozcelık
Öz
As the prevalence of IoT devices increases, the need for strengthening security becomes inevitable. Lightweight encryption solutions play a pivotal role, particularly in addressing security concerns associated with IoT authentication and privacy. This study concentrates on the performance evaluation of open-source and lightweight encryption libraries. Various open-source encryption libraries underwent testing on a Raspberry Pi, revealing noteworthy variations in key generation, signing, verification times, and memory usage. This research provides comprehensive assistance for the selection of encryption libraries for IoT applications. Consideration extends beyond library performance, encompassing factors such as user base and documentation quality, to deliver optimal security solutions
Destekleyen Kurum
The Scientific and Technological Research Council of Türkiye (TÜBİTAK)
Teşekkür
This material is based upon work supported by the Scientific and Technological Research Council of Türkiye (TÜBİTAK) contract/grant number 122E517. The authors gratefully acknowledge this support and take responsibility for the contents of this report. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Scientific and Technological Research Council of Türkiye (TÜBİTAK).
Kaynakça
- [1] Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y. Comprehensive study of symmetric key and asymmetric key encryption algorithms. International conference on Engineering and Technology (ICET) 2017; 1-7.
- [2] Islam T, Youki RA, Chowdhury BR, Hasan AT. An ECC based secure communication protocol for resource constraints IoT devices in smart home. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning 2021; 431-444.
- [3] Tawalbeh LA, Mowafi M, Aljoby W. Use of elliptic curve cryptography for multimedia encryption. IET Information Security 2013; 7(2): 67-74.
- [4] Caelli WJ, Dawson EP, Rea SA. PKI, Elliptic curve cryptography, and digital signatures. Computers & Security 1999; 18(1): 47-66.
- [5] Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Applied Sciences 2021; 12(1): 74.
- [6] Cheng R, Wu K, Su Y, Li W, Cui W, Tong J. An efficient ECC-based CP-ABE scheme for power IoT. Processes 2021; 9(7): 1176.
- [7] Brychta J. Benchmarks with points on elliptic curves. InProc. 25th Conf. Student Eeict 2019; 520-524.
[8] Hijawi U, Unal D, Hamila R, Gastli A, Ellabban O. Performance evaluation of no-pairing ECC-based KPABE on IoT platforms. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020; 225-230.
- [9] Tschofenig H, Pégourié-Gonnard M. Performance investigations. IETF Proceeding 2015; 92.
- [10] Mahto D, Yadav DK. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018; 20(4): 625-35.
- [11] Kardi A, Zagrouba R, Alqahtani M. Performance evaluation of RSA and elliptic curve cryptography in wireless sensor networks. 21st Saudi Computer Society National Computer Conference (NCC) 2018; 1-6.
- [12] Gupta V, Gupta S, Chang S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 1st ACM workshop on Wireless security 2002; 87-94.
- [13] Koppl M, Siroshtan D, Orgon M, Pocarovsky S, Bohacik A, Kuchar K, Holasova E. Performance Comparison of ECDH and ECDSA. 2nd International Conference on Electronics, Communications and Information Technology (CECIT) 2021; 825-829.
- [14] Pigatto DF, da Silva NB, Branco KR. Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries. Journal of Applied Computing Research. 2011; 1(2): 95-103.
- [15] Popa L, Groza B, Murvay PS. Performance evaluation of elliptic curve libraries on automotive-grade microcontrollers. In Proceedings of the 14th International Conference on Availability, Reliability and Security 2019; 1-7.
- [16] Di Matteo S, Baldanzi L, Crocetti L, Nannipieri P, Fanucci L, Saponara S. Secure elliptic curve crypto processor for real-time IoT applications. Energies. 2021; 14(15): 4676.
- [17] Aikins-Bekoe S, Hayfron-Acquah JB. Elliptic curve Diffie Hellman (ECDH) analogy for secured wireless sensor networks. International Journal of Computer Applications. 2020; 176(10): 1-8.