Cargando…
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the clo...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620735/ https://www.ncbi.nlm.nih.gov/pubmed/28850104 http://dx.doi.org/10.3390/s17091978 |
_version_ | 1783267649528004608 |
---|---|
author | Suárez-Albela, Manuel Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Castedo, Luis |
author_facet | Suárez-Albela, Manuel Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Castedo, Luis |
author_sort | Suárez-Albela, Manuel |
collection | PubMed |
description | Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. |
format | Online Article Text |
id | pubmed-5620735 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-56207352017-10-03 A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications Suárez-Albela, Manuel Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Castedo, Luis Sensors (Basel) Article Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. MDPI 2017-08-29 /pmc/articles/PMC5620735/ /pubmed/28850104 http://dx.doi.org/10.3390/s17091978 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Suárez-Albela, Manuel Fernández-Caramés, Tiago M. Fraga-Lamas, Paula Castedo, Luis A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title | A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title_full | A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title_fullStr | A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title_full_unstemmed | A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title_short | A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications |
title_sort | practical evaluation of a high-security energy-efficient gateway for iot fog computing applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620735/ https://www.ncbi.nlm.nih.gov/pubmed/28850104 http://dx.doi.org/10.3390/s17091978 |
work_keys_str_mv | AT suarezalbelamanuel apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT fernandezcaramestiagom apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT fragalamaspaula apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT castedoluis apracticalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT suarezalbelamanuel practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT fernandezcaramestiagom practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT fragalamaspaula practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications AT castedoluis practicalevaluationofahighsecurityenergyefficientgatewayforiotfogcomputingapplications |