2019
DOI: 10.1155/2019/8520562
|View full text |Cite
|
Sign up to set email alerts
|

Influence of Encryption Algorithms on Power Consumption in Energy Harvesting Systems

Abstract: Autonomous energy harvesting sensors present one of the most attractive areas of microelectronics at the moment. They are a part of Internet of Things (IoT) systems so the data need to be protected across transmission. One way for data protection is encryption and the other way is digital signature. However, energy consumption of those systems is increased using protections algorithms, and it should be considered because these are energy harvesting systems. The paper describes the ways in which data encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The authors in [67] compared the energy consumption of TEA, XTEA, and SKYPJACK for the 8-bit MCU PIC18F45K22 and ST-TX03-ASK 434 MHz radio module. XTEA had the best energetic performance for encrypting the data.…”
Section: Discussionmentioning
confidence: 99%
“…The authors in [67] compared the energy consumption of TEA, XTEA, and SKYPJACK for the 8-bit MCU PIC18F45K22 and ST-TX03-ASK 434 MHz radio module. XTEA had the best energetic performance for encrypting the data.…”
Section: Discussionmentioning
confidence: 99%
“…Most of these schemes are based on asymmetric cryptography which will be based on Public Key Infrastructure (PKI) could be for securing the keys exchanged between the motes or securing the data from mobile adversaries [8]. Asymmetric key cryptographic measures are generally not preferred in wireless sensor networks because of their high usage of power [5]. Hence we have proposed a scheme that is based on symmetric key cryptography by properly handling the trade-off between power dissipation rate and underlying operations.…”
Section: Proposed Systemmentioning
confidence: 99%
“…needs to be done between the logic and power factor. In this view, we are proposing a symmetric key cryptosystem which is built using low power LFSRs [4], [5] and is a variation of A5 family-a standard stream cipher system [6].…”
mentioning
confidence: 99%
“…For example, many IoT devices are battery-operated, hence, they do not have sufficient processing capabilities for the conventional security mechanisms. For instance, the works in [5] and [6] show that the security overhead for implementing various encryption techniques in terms of processing time, Central Processing Unit (CPU) usage, Random Access Memory (RAM) usage, as well as the energy consumption during the implementation, are high in cost for resource constrained IoT devices. Therefore, it becomes infeasible to implement specific security mechanisms on certain IoT devices with low CPU or RAM capabilities.…”
Section: Motivationmentioning
confidence: 99%