TY - GEN
T1 - Future proofing IoT embedded platforms for cryptographic primitives support
AU - Plaga, Sven
AU - Wiedermann, Norbert
AU - Niedermaier, Matthias
AU - Giehl, Alexander
AU - Newe, Thomas
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/7/2
Y1 - 2018/7/2
N2 - Information security is an important property in areas with distributed and decentralized communication like the Internet of Things (IoT) or Wireless Sensor Nodes (WSNs). Secure communication realises the protection goals of confidentiality, integrity, and authenticity, which are implemented by cryptographic functions. These functions need to evolve steadily in order to catch up with new attack vectors employed by cyber-criminals. This cryptographic evolution brings an increase of resource demand and consumption with it as cryptographic functions rise in complexity. The demand is difficult to satisfy by embedded platforms since they are often limited in their resources due to design efficiency. Therefore, adequate resource buffering is a crucial task in designing embedded systems that are future proof from a security point of view. In this work, we introduce a methodology for comparable resource benchmarking of cryptographic functions on embedded systems. Our approach enables designers and developers of embedded systems to achieve comparable results over an extended range of algorithms and implementations. This aids in the estimation of the cryptographic resource footprint. Further, we develop a measurement architecture for experimentation on different embedded platforms. We conduct a sample of reference measurements confirming well-known patterns in cryptography showing the validity of our framework. Finally, we argue for an open collaboration platform for sharing of benchmark results conducted with the framework.
AB - Information security is an important property in areas with distributed and decentralized communication like the Internet of Things (IoT) or Wireless Sensor Nodes (WSNs). Secure communication realises the protection goals of confidentiality, integrity, and authenticity, which are implemented by cryptographic functions. These functions need to evolve steadily in order to catch up with new attack vectors employed by cyber-criminals. This cryptographic evolution brings an increase of resource demand and consumption with it as cryptographic functions rise in complexity. The demand is difficult to satisfy by embedded platforms since they are often limited in their resources due to design efficiency. Therefore, adequate resource buffering is a crucial task in designing embedded systems that are future proof from a security point of view. In this work, we introduce a methodology for comparable resource benchmarking of cryptographic functions on embedded systems. Our approach enables designers and developers of embedded systems to achieve comparable results over an extended range of algorithms and implementations. This aids in the estimation of the cryptographic resource footprint. Further, we develop a measurement architecture for experimentation on different embedded platforms. We conduct a sample of reference measurements confirming well-known patterns in cryptography showing the validity of our framework. Finally, we argue for an open collaboration platform for sharing of benchmark results conducted with the framework.
UR - http://www.scopus.com/inward/record.url?scp=85061510173&partnerID=8YFLogxK
U2 - 10.1109/ICSensT.2018.8603610
DO - 10.1109/ICSensT.2018.8603610
M3 - Conference contribution
AN - SCOPUS:85061510173
T3 - Proceedings of the International Conference on Sensing Technology, ICST
SP - 52
EP - 57
BT - 2018 12th International Conference on Sensing Technology, ICST 2018
PB - IEEE Computer Society
T2 - 12th International Conference on Sensing Technology, ICST 2018
Y2 - 4 December 2018 through 6 December 2018
ER -