Show simple item record

dc.contributor.authorSuárez-Albela, Manuel
dc.contributor.authorFraga-Lamas, Paula
dc.contributor.authorFernández-Caramés, Tiago M.
dc.date.accessioned2018-12-04T15:33:05Z
dc.date.available2018-12-04T15:33:05Z
dc.date.issued2018-11-10
dc.identifier.citationSuárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T.M. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 2018, 18, 3868.es_ES
dc.identifier.issn1424-8220
dc.identifier.issn1424-8239
dc.identifier.urihttp://hdl.handle.net/2183/21449
dc.description.abstract[Abstract] The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher layers from part of their computational and data processing requirements. In the specific case of fog computing systems, they reduce greatly the requirements of cloud-centric systems by processing in fog gateways part of the data generated by end devices, thus providing services that were previously offered by a remote cloud. Thanks to recent advances in System-on-Chip (SoC) energy efficiency, it is currently possible to create IoT end devices with enough computational power to process the data generated by their sensors and actuators while providing complex services, which in recent years derived into the development of the mist computing paradigm. To allow mist computing nodes to provide the previously mentioned benefits and guarantee the same level of security as in other architectures, end-to-end standard security mechanisms need to be implemented. In this paper, a high-security energy-efficient fog and mist computing architecture and a testbed are presented and evaluated. The testbed makes use of Transport Layer Security (TLS) 1.2 Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) cipher suites (that comply with the yet to come TLS 1.3 standard requirements), which are evaluated and compared in terms of energy consumption and data throughput for a fog gateway and two mist end devices. The obtained results allow a conclusion that ECC outperforms RSA in both energy consumption and data throughput for all the tested security levels. Moreover, the importance of selecting a proper ECC curve is demonstrated, showing that, for the tested devices, some curves present worse energy consumption and data throughput than other curves that provide a higher security level. As a result, this article not only presents a novel mist computing testbed, but also provides guidelines for future researchers to find out efficient and secure implementations for advanced IoT devices.es_ES
dc.description.sponsorshipXunta de Galicia; ED431C 2016-045es_ES
dc.description.sponsorshipXunta de Galicia; ED341D R2016/012es_ES
dc.description.sponsorshipXunta de Galicia; ED431G/01es_ES
dc.description.sponsorshipAgencia Estatal de Investigación de España; TEC2013-47141-C4-1-Res_ES
dc.description.sponsorshipAgencia Estatal de Investigación de España; TEC2015-69648-REDCes_ES
dc.description.sponsorshipAgencia Estatal de Investigación de España; TEC2016-75067-C4-1-Res_ES
dc.language.isoenges_ES
dc.publisherM D P I AGes_ES
dc.relation.urihttps://doi.org/10.3390/s18113868es_ES
dc.rightsAtribución 3.0 Españaes_ES
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/es/*
dc.subjectECCes_ES
dc.subjectECDSAes_ES
dc.subjectRSAes_ES
dc.subjectIoTes_ES
dc.subjectIoT securityes_ES
dc.subjectEnergy efficiencyes_ES
dc.subjectMist computinges_ES
dc.subjectEdge computinges_ES
dc.titleA practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient Fog and mist computing deviceses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.rights.accessinfo:eu-repo/semantics/openAccesses_ES
UDC.journalTitleSensorses_ES
UDC.volume18es_ES
UDC.issue11es_ES
UDC.startPage3868es_ES
dc.identifier.doi10.3390/s18113868


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record