Cargando…

A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the clo...

Descripción completa

Detalles Bibliográficos
Autores principales: Suárez-Albela, Manuel, Fernández-Caramés, Tiago M., Fraga-Lamas, Paula, Castedo, Luis
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620735/
https://www.ncbi.nlm.nih.gov/pubmed/28850104
http://dx.doi.org/10.3390/s17091978
_version_ 1783267649528004608
author Suárez-Albela, Manuel
Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Castedo, Luis
author_facet Suárez-Albela, Manuel
Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Castedo, Luis
author_sort Suárez-Albela, Manuel
collection PubMed
description Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.
format Online
Article
Text
id pubmed-5620735
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-56207352017-10-03 A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications Suárez-Albela, Manuel Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Castedo, Luis Sensors (Basel) Article Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. MDPI 2017-08-29 /pmc/articles/PMC5620735/ /pubmed/28850104 http://dx.doi.org/10.3390/s17091978 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Suárez-Albela, Manuel
Fernández-Caramés, Tiago M.
Fraga-Lamas, Paula
Castedo, Luis
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title_full A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title_fullStr A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title_full_unstemmed A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title_short A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
title_sort practical evaluation of a high-security energy-efficient gateway for iot fog computing applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620735/
https://www.ncbi.nlm.nih.gov/pubmed/28850104
http://dx.doi.org/10.3390/s17091978
work_keys_str_mv AT suarezalbelamanuel apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT fernandezcaramestiagom apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT fragalamaspaula apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT castedoluis apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT suarezalbelamanuel practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT fernandezcaramestiagom practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT fragalamaspaula practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications
AT castedoluis practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications