Next Article in Journal
Specification and Performance Indicators of AeroRing—A Multiple-Ring Ethernet Network for Avionics Embedded Systems
Next Article in Special Issue
Adaptive Data Synchronization Algorithm for IoT-Oriented Low-Power Wide-Area Networks
Previous Article in Journal
Wind-Induced Fatigue and Asymmetric Damage in a Timber Bridge
Previous Article in Special Issue
A Joint Low-Power Cell Search and Frequency Tracking Scheme in NB-IoT Systems for Green Internet of Things
Article

A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices

Department of Computer Engineering, Faculty of Computer Science, Universidade da Coruña, 15071 A Coruña, Spain
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(11), 3868; https://doi.org/10.3390/s18113868
Received: 15 October 2018 / Revised: 5 November 2018 / Accepted: 6 November 2018 / Published: 10 November 2018
(This article belongs to the Special Issue Green Communications and Networking for IoT)
The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher layers from part of their computational and data processing requirements. In the specific case of fog computing systems, they reduce greatly the requirements of cloud-centric systems by processing in fog gateways part of the data generated by end devices, thus providing services that were previously offered by a remote cloud. Thanks to recent advances in System-on-Chip (SoC) energy efficiency, it is currently possible to create IoT end devices with enough computational power to process the data generated by their sensors and actuators while providing complex services, which in recent years derived into the development of the mist computing paradigm. To allow mist computing nodes to provide the previously mentioned benefits and guarantee the same level of security as in other architectures, end-to-end standard security mechanisms need to be implemented. In this paper, a high-security energy-efficient fog and mist computing architecture and a testbed are presented and evaluated. The testbed makes use of Transport Layer Security (TLS) 1.2 Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) cipher suites (that comply with the yet to come TLS 1.3 standard requirements), which are evaluated and compared in terms of energy consumption and data throughput for a fog gateway and two mist end devices. The obtained results allow a conclusion that ECC outperforms RSA in both energy consumption and data throughput for all the tested security levels. Moreover, the importance of selecting a proper ECC curve is demonstrated, showing that, for the tested devices, some curves present worse energy consumption and data throughput than other curves that provide a higher security level. As a result, this article not only presents a novel mist computing testbed, but also provides guidelines for future researchers to find out efficient and secure implementations for advanced IoT devices. View Full-Text
Keywords: ECC; ECDSA; RSA; IoT; IoT security; energy efficiency; mist computing; edge computing ECC; ECDSA; RSA; IoT; IoT security; energy efficiency; mist computing; edge computing
Show Figures

Figure 1

MDPI and ACS Style

Suárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T.M. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 2018, 18, 3868. https://doi.org/10.3390/s18113868

AMA Style

Suárez-Albela M, Fraga-Lamas P, Fernández-Caramés TM. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors. 2018; 18(11):3868. https://doi.org/10.3390/s18113868

Chicago/Turabian Style

Suárez-Albela, Manuel, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. 2018. "A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices" Sensors 18, no. 11: 3868. https://doi.org/10.3390/s18113868

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop