This paper presents the performance evaluation of asymmetric cryptographic algorithms oriented to embedded platforms used in Wireless Sensor Networks (WSN). The algorithms RSA, ECC and MQQ were evaluated on ARM platform. We have used three criteria in our comparison: the processing time, memory and processor usage. We used the SimpleScalar tool for our simulations analysis. The MQQ algorithm achieved the best results in most of the evaluated criteria. Considering the same key sizes, the processing time for MQQ is at least 16 times smaller than the ECC and 230 times smaller than RSA. Regarding memory consumption, the MQQ had an occupation 61% lower than the RSA and 24% less than in the ECC. Besides these, other criteria such as misses on cache level 1, branches, replacements and write-backs were recorded in order to improve our assessment. Finally, we show the MQQ is a good algorithm for embedded systems since it is better than ECC e RSA.
Additional information is available at the end of the chapter http://dx.doi.org/10.5772/48464 IntroductionA Wireless Sensor Network (WSN) is composed of autonomous devices called sensor nodes that generally have low computational power, limited data transmission and power constraints. A WSN consists of sensor nodes that capturing information from an environment, processing data and transmitting them via radio signals. WSNs are increasingly present in our days and can be found in environmental area (climatic measurements, presence of smoke), in health area (measurement of vital signs, temperature), home automation (motion sensor and image sensor) and other areas. Generally, WSNs have no fixed structure, and in many cases there is no monitoring station of sensor nodes during the operational life of the network, so a WSN must have mechanisms for self-configuration and adaptation in case of failure, inclusion or exclusion of a sensor node. Security requirements of WSNs are similar to conventional computer networks, therefore parameters such as confidentiality, integrity, availability and authenticity must be taken into account in creation of a network environment. Due to limitations of WSNs, not all security solutions designed for conventional computer networks can be implemented directly in WSN. For a long time, it was believed that the public key cryptography was not suitable for WSNs because it was required high processing power, but through studies of encryption algorithms based on curves was verified the feasibility of that technique in WSN.The cryptographic algorithm RSA is currently the most used among the asymmetric algorithms, working from the difficulty of factoring large prime numbers. Standardized by NIST 1 , this algorithm is widely used in transactions on the Internet. The algorithms Elliptic / Hyperelliptic Curve Cryptography (ECC / HECC) were created in 80s, and are based on the difficulty of solving the discrete logarithm problem on elliptic curves and hyperelliptic respectively. Despite its complexity the algorithm based on elliptic and hyperelliptic curves have been extensively studied in academia. Recently, the public key algorithm called 1 U.S. Agency for technology that has a partnership with industry to develop and apply technology, measurements and standards. Further information: www.nist.gov
This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.