We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices

by K. Sathish Kumar, R. Sukumar, P. Asrin Banu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 1
Year of Publication: 2012
Authors: K. Sathish Kumar, R. Sukumar, P. Asrin Banu
10.5120/4917-7138

K. Sathish Kumar, R. Sukumar, P. Asrin Banu . An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices. International Journal of Computer Applications. 40, 1 ( February 2012), 1-7. DOI=10.5120/4917-7138

@article{ 10.5120/4917-7138,
author = { K. Sathish Kumar, R. Sukumar, P. Asrin Banu },
title = { An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 1 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number1/4917-7138/ },
doi = { 10.5120/4917-7138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:54.115117+05:30
%A K. Sathish Kumar
%A R. Sukumar
%A P. Asrin Banu
%T An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 1
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the continuous advancement in technology, mobile devices are playing important role in everyone’s day to day life. Everyone is moving towards wireless mobile systems, but power consumption is an important concern in such devices. While designing, a lot of care has to be taken especially in power optimization because there is no regular power supply in this kind of devices. The capacity of battery grows up very slowly, which is insufficient for the electricity that the handheld devices demand, and thus designs and implementations of battery-efficient systems are in urgent need. The energy consumption of these algorithms is measured by loading their software level cryptographic protocol implementations through the device’s serial port, running them and measuring their power consumption. Our results will show that proposed cryptographic protocol provides a better security guarantee and acquires much less energy consumption than the existing cryptographic protocols. Finally, performance analysis will show that compared with existing cryptographic protocols, our proposed scheme is to be more simple, secure and efficient.

References
  1. Prasanna Ganesan.S, An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography, International Journal of Recent Trends in Engineering and Technology,Vol. 3, No. 2,2010.
  2. Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy Analysis of Public-Key Cryptography on Small Wireless Devices, The IEEE PerCom 2005.
  3. Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao, Energy analysis of multimedia video decoding on mobile handheld devices, Computer Standards & Interfaces Volume 32 Issue 1-2,2009.
  4. Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao, Power consumption analysis of audio applications on mobile handheld devices, The IEEE TENCON 2007.
  5. Darrel Hankerson, Julio L.opez Hernandez and Alfred Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields, CHES 2000, LNCS 1965, pp. 1{24, 2000}.
  6. Harsandeep Brar,Performance analysis of Point multiplication methods for Elliptic curve cryptography, 2008.
  7. Finnigin.K.M, B. E. Mullins, R. A. Raines, and H. B. Potoczny, Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks, International Journal of Security and Networks, vol. 2, no.3/4, pp. 260-271,2006.
  8. Ganesan R, Gobi M and Dr. Vivekanandan, Elliptic and Hyperelliptic Curve Cryptography Over Finite Field Fp,i-Manager’s Journal on Software Engineering, Vol.3, Issue No.2, pp 43-48, ISSN-0973-5151,2008.
  9. Helena Rif`a-Pous and Jordi Herrera-Joancomarti, Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices, Future Internet 3(1): 31-48, 2011.
  10. Lauter.K, The advantages of elliptic cryptography for wireless security, IEEE Wireless Communications, pp. 62 - 67, Feb. 2006.
  11. Marisa W. Paryasto, Kuspriyanto, Sarwono Sutikno and Arif Sasongko, Issues in Elliptic Curve Cryptography Implementation, INTERNETWORKING INDONESIA JOURNAL 2009.
  12. Nachiketh R.Potlapally,Srivaths Ravi,Anand Raghunathan and Niraj K. Jha, A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 2, FEBRUARY 2006, pages 128-143.
  13. Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani, Energy Consumption in Mobile Phones: A MeasurementStudy and Implications for Network Application, IMC’09, November 4–6, 2009, Chicago, Illinois, USA.
  14. NeetuSettia, Cryptanalysis of modern Cryptography Algorithms, International Journal of Computer Science and Technology. December 2010.
  15. Nadeem .A , A performance comparison of data encryption algorithms, IEEE information and communication technologies, pp.84-89, 2006.Bn.
  16. Patroklos G. Argyroudis Raja Verma Hitesh Tewari DonalO’Mahony, Performance Analysis of Cryptographic Protocols on Handheld Devices, NCA 2004: 169-174.
  17. Padma Bh, D.Chandravathi , P.Prapoorna Roja Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method,International Journal on Computer Science and Engineering ,Vol. 02, No. 05,2010, 1904-1907.
  18. Prasanna Ganesan .S, An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography, IEEE TRANSACTIONS ON MOBILE COMPUTING, pages 107-109, 2010.
  19. Shanmugalakshmi.R and M.Prabu, Research Issues on Elliptic Curve Cryptography and Its applications,International Journal of Computer Science and Network Security, VOL.9 No.6,2009.
  20. Wendy Chou, Dr. Lawrence Washington, Elliptic Curve Cryptography and Its Applications to Mobile Devices, Proc. IEEE INFOCOM ’04, Mar.2004.
Index Terms

Computer Science
Information Sciences

Keywords

Security Energy analysis Low-power Handheld devices Cryptographic algorithms Authentication Battery life