160 likes | 324 Views
Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis. Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller , Mihail Sichitiu Center for Embedded Systems Research
E N D
Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu Center for Embedded Systems Research Departments of Computer Science / Electrical and Computer Engineering North Carolina State University
Motivation • Embedded devices (8 bit processors) • Security concerns (wireless / RF) • Need for encryption (PDAs, sensor networks) • Feasible? • Too much computational overhead for low-end devices? • How about sensor networks? • Assess overhead for • Different architectures • Different encryption schemes • Derive analytical model, allows estimation for • New algorithms • New architecture
Performance Model – Why? • Feasibility algorithm A on platform P • derived from performance evaluation on a different platform Q • Asses encryption overhead based on architectural parameters • derive minimum requirements • New encryption schemes can be evaluated on a single hardware platform • extrapolated to other platforms
Multiply support: RICS vs CISC: Refinements for the ISA/architecture
Performance Model – Why? • Feasibility algorithm A on platform P • derived from performance evaluation on a different platform Q • Asses encryption overhead based on architectural parameters • derive minimum requirements • New encryption schemes can be evaluated on a single hardware platform • extrapolated to other platforms
Variance of Execution (SHA-1) • Important for real-time scheduling
Related Work • Brown et al.: PGP in wireless feasible (USENIX’00) • Lu et al.: RSA on smartcards costly ~20 secs @ 3.57 MHz (SAC’00) • Perrig et al.: SPINS (MobiCom’02) • Touch: Crypto overhead on general-purpose machines (SIGCOMM’95) • Little work on embedded systems: • Freeman/Miller: M68k (MASCOTS’99) • Dai: Celeron results for Cryto++ 4.0 benchmarks
Conclusion • Survey • computational requirements • for cryptographic algorithms • and embedded architectures • Experiments • mostly uniform cycle overhead for each word size (8/16/32 bits) • but differences among classes • Parameters that matter: text length, block size, architectural (few) • Uniformity Approximate Model • Derive minimum requirements • predict performance on new hardware