{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:37:55Z","timestamp":1772912275573,"version":"3.50.1"},"reference-count":104,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T00:00:00Z","timestamp":1503964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"],"award-info":[{"award-number":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain","award":["TEC2013-47141-C4-1-R"],"award-info":[{"award-number":["TEC2013-47141-C4-1-R"]}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain","award":["TEC2015-69648-REDC"],"award-info":[{"award-number":["TEC2015-69648-REDC"]}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain","award":["TEC2016-75067-C4-1-R"],"award-info":[{"award-number":["TEC2016-75067-C4-1-R"]}]},{"name":"ERDF funds of the EU","award":["AEI\/FEDER, UE"],"award-info":[{"award-number":["AEI\/FEDER, UE"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest\u2013Shamir\u2013Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.<\/jats:p>","DOI":"10.3390\/s17091978","type":"journal-article","created":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T10:39:15Z","timestamp":1504003155000},"page":"1978","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":104,"title":["A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9891-4553","authenticated-orcid":false,"given":"Manuel","family":"Su\u00e1rez-Albela","sequence":"first","affiliation":[{"name":"Department Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"additional","affiliation":[{"name":"Department Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[{"name":"Department Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"given":"Luis","family":"Castedo","sequence":"additional","affiliation":[{"name":"Department Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/MCOM.2017.1600730","article-title":"EXEGESIS: Extreme Edge Resource Harvesting for a Virtualized Fog Environment","volume":"55","author":"Markakis","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., and Addepalli, S. (2012, January 17). Fog Computing and its Role in the Internet of Things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland.","DOI":"10.1145\/2342509.2342513"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Peralta, G., Iglesias-Urkia, M., Barcelo, M., Gomez, R., Moran, A., and Bilbao, J. (2017, January 24\u201326). Fog computing based efficient IoT scheme for the Industry 4.0. Proceedings of the IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechatronics (ECMSM), Donostia, Spain.","DOI":"10.1109\/ECMSM.2017.7945879"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/JSYST.2015.2469676","article-title":"An Energy-Efficient Architecture for the Internet of Things (IoT)","volume":"11","author":"Kaur","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TSUSC.2017.2714959","article-title":"Investigating Energy Consumption and Performance Trade-Off for Interactive Cloud Application","volume":"2","author":"Hasan","year":"2017","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2151","DOI":"10.1109\/ACCESS.2015.2497312","article-title":"Green Internet of Things for Smart World","volume":"3","author":"Zhu","year":"2015","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/MCOM.2017.1600437CM","article-title":"Efficient IoT Gateway over 5G Wireless: A New Design with Prototype and Implementation Results","volume":"55","author":"Saxena","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Exp\u00f3sito, J., Fern\u00e1ndez-Caram\u00e9s, T., Fraga-Lamas, P., and Castedo, L. (2017). VineSens: An Eco-Smart Decision-Support Viticulture System. Sensors, 17.","DOI":"10.3390\/s17030465"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2017.1600218CM","article-title":"Efficient Energy Management for the Internet of Things in Smart Cities","volume":"55","author":"Ejaz","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Noceda-Davila, D., Fern\u00e1ndez-Caram\u00e9s, T.M., D\u00edaz-Bouza, M., and Vilar-Montesinos, M. (2016). Smart Pipe System for a Shipyard 4.0. Sensors, 16.","DOI":"10.3390\/s16122186"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Noceda-Davila, D., and Vilar-Montesinos, M. (2017, January 9\u201311). RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards. Proceedings of the 2017 IEEE International Conference on RFID (RFID), Phoenix, AZ, USA.","DOI":"10.1109\/RFID.2017.7945603"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"9882","DOI":"10.1109\/ACCESS.2017.2702013","article-title":"Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study","volume":"5","author":"Baccarelli","year":"2017","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Dapena, A., and Gonz\u00e1lez-L\u00f3pez, M. (2016). Home Automation System Based on Intelligent Transducer Enablers. Sensors, 16.","DOI":"10.3390\/s16101595"},{"key":"ref_14","first-page":"1","article-title":"An intelligent power outlet system for the smart home of the Internet of Things","volume":"2015","year":"2015","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Blanco-Novoa, O., Fern\u00e1ndez-Caram\u00e9s, T., Fraga-Lamas, P., and Castedo, L. (2017). An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy. Sensors, 17.","DOI":"10.3390\/s17030643"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Su\u00e1rez-Albela, M., Castedo, L., and Gonz\u00e1lez-L\u00f3pez, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16.","DOI":"10.3390\/s16101644"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., and Castedo, L. (2017). Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways. Sensors, 17.","DOI":"10.3390\/s17061457"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Su\u00e1rez-Albela, M., and Castedo, L. (2016). Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications. Sensors, 17.","DOI":"10.3390\/s17010028"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2017, January 9\u201311). Reverse engineering the communications protocol of an RFID public transportation card. Proceedings of the 2017 IEEE International Conference on RFID (RFID), Phoenix, AZ, USA.","DOI":"10.1109\/RFID.2017.7945583"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a cyberwarfare weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1109\/ACCESS.2016.2560919","article-title":"Attitudes and perceptions of IoT security in critical societal services","volume":"4","author":"Asplund","year":"2016","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mukherjee, B., Neupane, R.L., and Calyam, P. (2017, January 26\u201328). End-to-End IoT Security Middleware for Cloud-Fog Communication. Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), New York, NY, USA.","DOI":"10.1109\/CSCloud.2017.62"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","article-title":"Management of resource constrained devices in the internet of things","volume":"50","author":"Sehgal","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_24","unstructured":"Wander, A.S., Gura, N., Eberle, H., Gupta, V., and Shantz, S.C. (2005, January 8\u201312). Energy analysis of public-key cryptography for wireless sensor networks. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, HI, USA."},{"key":"ref_25","first-page":"301","article-title":"Internet of Things: Architectural Framework for eHealth Security","volume":"1","author":"Lake","year":"2014","journal-title":"J. ICT Stand."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"M\u00f6ssinger, M., Petschkuhn, B., Bauer, J., Staudemeyer, R.C., W\u00f3jcik, M., and P\u00f6hls, H.C. (2016, January 21\u201324). Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. Proceedings of the 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal.","DOI":"10.1109\/WoWMoM.2016.7523559"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bauer, J., Staudemeyer, R.C., P\u00f6lhls, H.C., and Fragkiadakis, A. (December, January 29). ECDSA on things: IoT integrity protection in practise. Proceedings of the 18th International Conference on Information and Communications Security (ICICS2016), Singapore.","DOI":"10.1007\/978-3-319-50011-9_1"},{"key":"ref_28","unstructured":"(2017, July 28). Terminology for Constrained-Node Networks. Available online: https:\/\/tools.ietf.org\/html\/rfc7228."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Raza, A., Ikram, A.A., Amin, A., and Ikram, A.J. (2016, January 6\u20137). A review of low cost and power efficient development boards for IoT applications. Proceedings of the 2016 Future Technologies Conference (FTC), San Francisco, CA, USA.","DOI":"10.1109\/FTC.2016.7821693"},{"key":"ref_30","unstructured":"(2017, July 28). Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). Available online: https:\/\/tools.ietf.org\/html\/rfc4279."},{"key":"ref_31","unstructured":"Polk, T., McKay, K., and Chokhani, S. (2005). Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, NIST. NIST Special Publication 800-52 Revision 1."},{"key":"ref_32","unstructured":"(2017, July 28). New Generation of Libelium Product Lines. Available online: http:\/\/www.libelium.com\/downloads\/new_generation_libelium_product_lines.pdf."},{"key":"ref_33","unstructured":"(2017, July 28). UDOO x86. Available online: http:\/\/www.udoo.org\/udoo-x86\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Johnston, S.J., Apetroaie-Cristea, M., Scott, M., and Cox, S.J. (2016, January 12\u201314). Applicability of commodity, low cost, single board computers for Internet of Things devices. Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845414"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Imteaj, A., Rahman, T., Hossain, M.K., and Zaman, S. (2016, January 18\u201320). IoT based autonomous percipient irrigation system using raspberry Pi. Proceedings of the 2016 19th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh.","DOI":"10.1109\/ICCITECHN.2016.7860260"},{"key":"ref_36","unstructured":"(2017, July 28). Tessel 2 Documentation. Available online: https:\/\/tessel.gitbooks.io\/t2-docs\/content\/."},{"key":"ref_37","unstructured":"(2017, July 28). UDOO NEO. Available online: http:\/\/www.udoo.org\/udoo-neo\/."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/JIOT.2015.2504622","article-title":"EZ-VSN: An Open-Source and Flexible Framework for Visual Sensor Networks","volume":"3","author":"Bondi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_39","unstructured":"(2017, July 28). The Intel Edison Module|IoT. Available online: https:\/\/software.intel.com\/en-us\/iot\/hardware\/edison."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Grygoruk, A., and Legierski, J. (2016, January 11\u201314). IoT gateway\u2014Implementation proposal based on Arduino board. Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (FedCSIS), Gdansk, Poland.","DOI":"10.15439\/2016F283"},{"key":"ref_41","unstructured":"Yang, Q., Zhou, G., Qin, W., Zhang, B., and Chiang, P.Y. (April, January 30). Air-kare: A Wi-Fi based, multi-sensor, real-time indoor air quality monitor. Proceedings of the 2015 IEEE International Wireless Symposium (IWS 2015), Shenzhen, China."},{"key":"ref_42","unstructured":"(2017, July 28). Arduino TIAN. Available online: https:\/\/www.arduino.cc\/en\/Main\/ArduinoBoardTian."},{"key":"ref_43","unstructured":"(2017, July 28). ESP32 Overview|Espressif Systems. Available online: https:\/\/espressif.com\/en\/products\/hardware\/esp32\/overview."},{"key":"ref_44","unstructured":"(2017, July 28). Particle Photon (Wi-Fi). Available online: https:\/\/www.particle.io\/products\/hardware\/photon-wifi-dev-kit."},{"key":"ref_45","first-page":"1","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"PP","author":"Nia","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P. (2015, January 21\u201325). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings of the 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, Austria.","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Atamli, A.W., and Martin, A. (2014, January 10). Threat-Based Security Analysis for the Internet of Things. Proceedings of the 2014 International Workshop on Secure Internet of Things, Heraklion, Wroclaw, Poland.","DOI":"10.1109\/SIoT.2014.10"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., and Neri, A. (2014, January 12\u201315). A federated architecture approach for Internet of Things security. Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy.","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Addo, I.D., Ahamed, S.I., Yau, S.S., and Buduru, A. (July, January 27). A Reference Architecture for Improving Security and Privacy in Internet of Things Applications. Proceedings of the 2014 IEEE International Conference on Mobile Services, Anchorage, AK, USA.","DOI":"10.1109\/MobServ.2014.24"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Grabovica, M., Popi\u0107, S., Pezer, D., and Kne\u1e91evi\u0107, V. (2016, January 1\u20132). Provided security measures of enabling technologies in Internet of Things (IoT): A survey. Proceedings of the 2016 Zooming Innovation in Consumer Electronics International Conference (ZINC), Novi Sad, Serbia.","DOI":"10.1109\/ZINC.2016.7513647"},{"key":"ref_51","first-page":"1","article-title":"IoT Middleware: A Survey on Issues and Enabling technologies","volume":"4","author":"Ngu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/COMST.2016.2515516","article-title":"M2M Security: Challenges and Solutions","volume":"18","author":"Barki","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Zhao, K., and Ge, L. (2013, January 14\u201315). A Survey on the Internet of Things Security. Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security, Leshan, China.","DOI":"10.1109\/CIS.2013.145"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., and Wang, C. (2012). Security Based on Physical Unclonability and Disorder. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref_56","unstructured":"(2017, July 28). Datagram Transport Layer Security Version 1.2. Available online: https:\/\/tools.ietf.org\/html\/rfc6347."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Hummen, R., and Wehrle, K. (2013, January 7\u201310). Standards-based end-to-end IP security for the Internet of Things. Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP), G\u00f6ttingen, Germany.","DOI":"10.1109\/ICNP.2013.6733648"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Van den Abeele, F., Vandewinckele, T., Hoebeke, J., Moerman, I., and Demeester, P. (2015, January 7\u20139). Secure communication in IP-based wireless sensor networks via a trusted gateway. Proceedings of the 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore.","DOI":"10.1109\/ISSNIP.2015.7106963"},{"key":"ref_59","unstructured":"(2017, July 28). The Transport Layer Security (TLS) Protocol Version 1.2. Available online: https:\/\/tools.ietf.org\/html\/rfc5246."},{"key":"ref_60","unstructured":"(2017, July 28). Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Available online: https:\/\/tools.ietf.org\/html\/rfc7250."},{"key":"ref_61","unstructured":"(2017, July 28). HTTP Over TLS. Available online: https:\/\/tools.ietf.org\/html\/rfc2818."},{"key":"ref_62","unstructured":"(2017, July 28). Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). Available online: https:\/\/tools.ietf.org\/search\/rfc4492."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Barker, E., Chen, L., Roginsky, A., and Smid, M. (2013). NIST Special Publication 800-56A Revision 2 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, NIST.","DOI":"10.6028\/NIST.SP.800-56Ar2"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MIC.2014.86","article-title":"An Experimental Study of TLS Forward Secrecy Deployments","volume":"18","author":"Huang","year":"2014","journal-title":"IEEE Internet Comput."},{"key":"ref_65","unstructured":"(2017, July 28). GnuTLS 3.5.5: Appendix D Supported Ciphersuites. Available online: http:\/\/www.gnutls.org\/manual\/gnutls.html."},{"key":"ref_66","unstructured":"(2017, July 28). Open SSL Ciphers. Available online: https:\/\/www.openssl.org\/docs\/man1.0.1\/apps\/ciphers.html."},{"key":"ref_67","unstructured":"(2017, July 28). Mbed TLS Core Features. Available online: https:\/\/tls.mbed.org\/core-features."},{"key":"ref_68","unstructured":"(2017, July 28). WolfSSL Manual\u2014Chapter 4 (Features). Available online: https:\/\/www.wolfssl.com\/wolfSSL\/Docs-wolfssl-manual-4-features.html."},{"key":"ref_69","first-page":"333","article-title":"Factorization of a 768-Bit {RSA} Modulus","volume":"6223","author":"Kleinjung","year":"2010","journal-title":"Crypto"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Pellegrini, A., Bertacco, V., and Austin, T. (2010, January 8\u201312). Fault-based attack of RSA authentication. Proceedings of the 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010), Dresden, Germany.","DOI":"10.1109\/DATE.2010.5456933"},{"key":"ref_71","unstructured":"Cosnard, M., and Philippe, J. (2001, January 8\u201312). The Quadratic Sieve Factoring Algorithm on Distributed Memory Multiprocessors. Proceedings of the Fifth Distributed Memory Computing Conference, Charleston, SC, USA."},{"key":"ref_72","unstructured":"Briggs, M.E. (1998). An Introduction to the General Number Field Sieve. [Master\u2019s Thesis, Virginia Polytechnic Institute and State University]."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., and Smid, M. (2012). Recommendation for Key Management\u2014Part 1: General (Revision 3), NIST. NIST Special Publication 800-57 Part 1, Revision 3.","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-42001-6_9","article-title":"Universal security from bits and mips to pools, lakes-and beyond","volume":"8260","author":"Lenstra","year":"2013","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Chakavarika, T.T., Chaurasia, B.K., and Gupta, S.K. (2016, January 6\u20138). Performance evaluation of a polynomial based key management scheme in wireless sensor networks. Proceedings of the 2016 International Conference on Communication and Signal Processing (ICCSP), Madras, India.","DOI":"10.1109\/ICCSP.2016.7754553"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Chakavarika, T.T., Chaurasia, B.K., and Gupta, S.K. (2016, January 6\u20138). Improved energy efficient key management scheme in wireless sensor networks. Proceedings of the 2016 International Conference on Communication and Signal Processing (ICCSP), Madras, India.","DOI":"10.1109\/ICCSP.2016.7754558"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Mbarek, B., and Meddeb, A. (2016, January 11\u201313). Energy efficient security protocols for wireless sensor networks : SPINS vs TinySec. Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia.","DOI":"10.1109\/ISNCC.2016.7746117"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Pateriya, R.K., and Vasudevan, S. (2011, January 3\u20135). Elliptic Curve Cryptography in Constrained Environments: A Review. Proceedings of the 2011 International Conference on Communication Systems and Network Technologies, Katra, Jammu, India.","DOI":"10.1109\/CSNT.2011.32"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Bafandehkar, M., Yasin, S.M., Mahmod, R., and Hanapi, Z.M. (2013, January 16\u201318). Comparison of ECC and RSA Algorithm in Resource Constrained Devices. Proceedings of the 2013 International Conference on IT Convergence and Security (ICITCS), Macau, China.","DOI":"10.1109\/ICITCS.2013.6717816"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S.C. (2004, January 11\u201313). Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Proceedings of the 6th International Workshop, Cambridge, MA, USA.","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref_81","unstructured":"Koschuch, M., Hudler, M., and Kr\u00fcger, M. (2010, January 26\u201328). Performance evaluation of the TLS handshake in the context of embedded devices. Proceedings of the 2010 International Conference on Data Communication Networking (DCNET), Athens, Greece."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TLA.2014.6894012","article-title":"Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems","volume":"12","author":"Feltrim","year":"2014","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Noroozi, E., Kadivar, J., and Shafiee, S.H. (2010, January 1\u20133). Energy analysis for wireless sensor networks. Proceedings of the 2010 2nd International Conference on Mechanical and Electronics Engineering, Kyoto, Japan.","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","article-title":"A study of the energy consumption characteristics of cryptographic algorithms and security protocols","volume":"5","author":"Potlapally","year":"2006","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Natarajan, P., and Zhu, J. (2014). Fog Computing: A Platform for Internet of Things and Analytics. Big Data and Internet of Things: A Roadmap for Smart Environments, Springer International Publishing.","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"ref_86","unstructured":"(2017, July 28). Open SSL. Available online: https:\/\/www.openssl.org\/."},{"key":"ref_87","unstructured":"(2017, July 28). Cortex-A Series Family. Available online: https:\/\/www.arm.com\/products\/processors\/cortex-a\/cortex-a7.php."},{"key":"ref_88","unstructured":"(2017, July 28). Orange Pi Pc. Available online: http:\/\/www.orangepi.org\/orangepipc\/."},{"key":"ref_89","unstructured":"(2017, July 28). Allwinner H3 Datasheet, Version 1.0. Available online: http:\/\/dl.linux-sunxi.org\/H3\/Allwinner_H3_Datasheet_V1.0.pdf."},{"key":"ref_90","unstructured":"(2017, July 28). Crypto Engine Support. Available online: http:\/\/sunxi.montjoie.ovh\/."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Hindle, A., Wilson, A., Rasmussen, K., Barlow, E.J., Campbell, J., and Romansky, S. (June, January 31). GreenMiner: A Hardware Based Mining Software Repositories Software Energy Consumption Framework. Proceedings of the 11th Working Conference on Mining Software Repositories (MSR 2014), Hyderabad, India.","DOI":"10.1145\/2597073.2597097"},{"key":"ref_92","unstructured":"(2017, July 28). Armbian: Linux for ARM Development Boards. Available online: http:\/\/www.armbian.com\/."},{"key":"ref_93","unstructured":"(2017, July 28). Usage Statistics and Market Share of Web Servers for Websites. Available online: https:\/\/w3techs.com\/technologies\/overview\/web_server\/all."},{"key":"ref_94","unstructured":"(2017, July 28). Ab: Apache HTTP Server Benchmarking Tool. Available online: https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/306225.306235","article-title":"Httperf: A tool for measuring web server performance","volume":"26","author":"Mosberger","year":"1998","journal-title":"Perform. Eval. Rev."},{"key":"ref_96","unstructured":"(2017, July 28). Siege Webpage. Available online: https:\/\/www.joedog.org\/siege-home\/."},{"key":"ref_97","unstructured":"(2017, July 28). Description of the \u201cLorem Ipsum Dolor Sit Amet\u201d Text that Appears in Word Help. Available online: https:\/\/support.microsoft.com\/en-us\/kb\/114222."},{"key":"ref_98","unstructured":"(2017, July 28). Faker Webpage. Available online: https:\/\/pypi.python.org\/pypi\/Faker\/0.7.3."},{"key":"ref_99","unstructured":"Xu, R., Li, Z., Wang, C., and Ni, P. (2003, January 19\u201322). Impact of data compression on energy consumption of wireless-networked handheld devices. Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, RI, USA."},{"key":"ref_100","unstructured":"(2017, July 28). Wireshark Webpage. Available online: https:\/\/www.wireshark.org\/."},{"key":"ref_101","unstructured":"Rao, W.-B., and Gan, Q. (2005, January 26). The performance analysis of two digital signature schemes based on secure charging protocol. Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China."},{"key":"ref_102","unstructured":"Dietz, M., Czeskis, A., Balfanz, D., and Wallach, D.S. (2012, January 8\u201310). Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. Proceedings of the USENIX Security Symposium, Bellevue, WA, USA."},{"key":"ref_103","unstructured":"(2017, July 28). TLS Origin-Bound Certificates. Available online: https:\/\/tools.ietf.org\/html\/draft-balfanz-tls-obc-01."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3390\/fi3010031","article-title":"Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices","volume":"3","year":"2011","journal-title":"Future Internet"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/1978\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:43:37Z","timestamp":1760208217000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/9\/1978"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,29]]},"references-count":104,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2017,9]]}},"alternative-id":["s17091978"],"URL":"https:\/\/doi.org\/10.3390\/s17091978","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,29]]}}}