{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:29:18Z","timestamp":1772112558625,"version":"3.50.1"},"reference-count":95,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T00:00:00Z","timestamp":1541808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Xunta de Galicia and ERDF funds of the EU (AEI\/FEDER, UE)","award":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"],"award-info":[{"award-number":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"]}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain and ERDF funds of the EU (AEI\/FEDER, UE)","award":["TEC2013-47141-C4-1-R, TEC2015-69648-REDC, TEC2016-75067-C4-1-R"],"award-info":[{"award-number":["TEC2013-47141-C4-1-R, TEC2015-69648-REDC, TEC2016-75067-C4-1-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher layers from part of their computational and data processing requirements. In the specific case of fog computing systems, they reduce greatly the requirements of cloud-centric systems by processing in fog gateways part of the data generated by end devices, thus providing services that were previously offered by a remote cloud. Thanks to recent advances in System-on-Chip (SoC) energy efficiency, it is currently possible to create IoT end devices with enough computational power to process the data generated by their sensors and actuators while providing complex services, which in recent years derived into the development of the mist computing paradigm. To allow mist computing nodes to provide the previously mentioned benefits and guarantee the same level of security as in other architectures, end-to-end standard security mechanisms need to be implemented. In this paper, a high-security energy-efficient fog and mist computing architecture and a testbed are presented and evaluated. The testbed makes use of Transport Layer Security (TLS) 1.2 Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) cipher suites (that comply with the yet to come TLS 1.3 standard requirements), which are evaluated and compared in terms of energy consumption and data throughput for a fog gateway and two mist end devices. The obtained results allow a conclusion that ECC outperforms RSA in both energy consumption and data throughput for all the tested security levels. Moreover, the importance of selecting a proper ECC curve is demonstrated, showing that, for the tested devices, some curves present worse energy consumption and data throughput than other curves that provide a higher security level. As a result, this article not only presents a novel mist computing testbed, but also provides guidelines for future researchers to find out efficient and secure implementations for advanced IoT devices.<\/jats:p>","DOI":"10.3390\/s18113868","type":"journal-article","created":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T02:42:41Z","timestamp":1542163361000},"page":"3868","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":105,"title":["A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9891-4553","authenticated-orcid":false,"given":"Manuel","family":"Su\u00e1rez-Albela","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago M.","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,10]]},"reference":[{"key":"ref_1","unstructured":"IHS (2018, October 15). Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (In Billions). Available online: https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Shehabi, A., Smith, S., Sartor, D., Brown, R., Herrlin, M., Koomey, J., Masanet, E., Horner, N., Azevedo, I., and Lintner, W. (2016). United States Data Center Energy Usage Report, Lawrence Berkeley National Laboratory. Number LBNL-1005775.","DOI":"10.2172\/1372902"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Avgerinou, M., Bertoldi, P., and Castellazzi, L. (2017). Trends in Data Centre Energy Consumption under the European Code of Conduct for Data Centre Energy Efficiency. Energies, 10.","DOI":"10.3390\/en10101470"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"O\u2019Dwyer, K.J., and Malone, D. (2014, January 26\u201327). Bitcoin mining and its energy footprint. Proceedings of the 25th IET Irish Signals Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014\/CIICT 2014), Limerick, Ireland.","DOI":"10.1049\/cp.2014.0699"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Exp\u00f3sito, J., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2017). VineSens: An Eco-Smart Decision-Support Viticulture System. Sensors, 17.","DOI":"10.3390\/s17030465"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Froiz-M\u00edguez, I., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018). Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes. Sensors, 18.","DOI":"10.3390\/s18082660"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Dapena, A., and Gonz\u00e1lez-L\u00f3pez, M. (2016). Home Automation System Based on Intelligent Transducer Enablers. Sensors, 16.","DOI":"10.3390\/s16101595"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., and Castedo, L. (2017). Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways. Sensors, 17.","DOI":"10.3390\/s17061457"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Rojas, D., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Escudero, C. (2018). Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications. Sensors, 18.","DOI":"10.3390\/s18010057"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-Rojas, D., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Escudero, C. (2018). A Plug-and-Play Human-Centered Virtual TEDS Architecture for the Web of Things. Sensors, 18.","DOI":"10.3390\/s18072052"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Noceda-Davila, D., Fern\u00e1ndez-Caram\u00e9s, T.M., D\u00edaz-Bouza, M., and Vilar-Montesinos, M. (2016). Smart Pipe System for a Shipyard 4.0. Sensors, 16.","DOI":"10.3390\/s16122186"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"25939","DOI":"10.1109\/ACCESS.2018.2833501","article-title":"A Review on Human-Centered IoT-Connected Smart Labels for the Industry 4.0","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Su\u00e1rez-Albela, M., Castedo, L., and Gonz\u00e1lez-L\u00f3pez, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16.","DOI":"10.3390\/s16101644"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1513","DOI":"10.1109\/ACCESS.2017.2779263","article-title":"Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues","volume":"6","author":"Yeow","year":"2018","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","article-title":"A Review on the Use of Blockchain for the Internet of Things","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"214805","DOI":"10.1155\/2015\/214805","article-title":"An intelligent power outlet system for the smart home of the Internet of Things","volume":"11","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Blanco-Novoa, O., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2017). An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy. Sensors, 17.","DOI":"10.3390\/s17030643"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"8201","DOI":"10.1109\/ACCESS.2018.2802699","article-title":"A Practical Evaluation of Commercial Industrial Augmented Reality Systems in an Industry 4.0 Shipyard","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"13358","DOI":"10.1109\/ACCESS.2018.2808326","article-title":"A Review on Industrial Augmented Reality Systems for the Industry 4.0 Shipyard","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Blanco-Novoa, O., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018). A Cost-Effective IoT System for Monitoring Indoor Radon Gas Concentration. Sensors, 18.","DOI":"10.3390\/s18072198"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Crepaldi, P.C., and Pimenta, T.C. (2017). A methodology for evaluating security in commercial RFID systems. Radio Frequency Identification, IntechOpen.","DOI":"10.5772\/62606"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","article-title":"Wireless Communication and Security Issues for Cyber-Physical Systems and the Internet-of-Things","volume":"106","author":"Burg","year":"2018","journal-title":"Proc. IEEE"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Su\u00e1rez-Albela, M., and Castedo, L. (2016). Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications. Sensors, 17.","DOI":"10.3390\/s17010028"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cleveland, F.M. (2008, January 20\u201324). Cyber security issues for Advanced Metering Infrastructure (AMI). Proceedings of the 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA.","DOI":"10.1109\/PES.2008.4596535"},{"key":"ref_25","unstructured":"Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., and Halderman, J.A. (2014, January 19). Green Lights Forever: Analyzing the Security of Traffic Infrastructure. Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT\u201914), San Diego, CA, USA."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Stuxnet: Dissecting a cyberwarfare weapon","volume":"9","author":"Langner","year":"2011","journal-title":"IEEE Secur. Priv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2130","DOI":"10.1109\/ACCESS.2016.2560919","article-title":"Attitudes and perceptions of IoT security in critical societal services","volume":"4","author":"Asplund","year":"2016","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Assaderaghi, F., Chindalore, G., Ibrahim, B., de Jong, H., Joye, M., Nassar, S., Steinbauer, W., Wagner, M., and Wille, T. (2017, January 5\u20138). Privacy and security: Key requirements for sustainable IoT growth. Proceedings of the 2017 Symposium on VLSI Technology, Kyoto, Japan.","DOI":"10.23919\/VLSIT.2017.7998185"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T., Fraga-Lamas, P., and Castedo, L. (2017). A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications. Sensors, 17.","DOI":"10.3390\/s17091978"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Su\u00e1rez-Albela, M., and D\u00edaz-Bouza, M. (2018). A Fog Computing Based Cyber-Physical System for the Automation of Pipe-Related Tasks in the Industry 4.0 Shipyard. Sensors, 18.","DOI":"10.3390\/s18061961"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., Su\u00e1rez-Albela, M., and Vilar-Montesinos, M. (2018). A Fog Computing and Cloudlet Based Augmented Reality System for the Industry 4.0 Shipyard. Sensors, 18.","DOI":"10.3390\/s18061798"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/MCOM.2018.1700299","article-title":"IoT in the Fog: A Roadmap for Data-Centric IoT Development","volume":"56","author":"Oteafy","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2015.207","article-title":"The Benefits of Self-Awareness and Attention in Fog and Mist Computing","volume":"48","author":"Preden","year":"2015","journal-title":"Computer"},{"key":"ref_34","unstructured":"(2018, October 15). MQTT Version 5.0, Committee Specification 02. Available online: http:\/\/docs.oasis-open.org\/mqtt\/mqtt\/v5.0\/cs02\/mqtt-v5.0-cs02.html."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MIC.2018.011581520","article-title":"TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices","volume":"22","author":"Sen","year":"2018","journal-title":"IEEE Internet Comput."},{"key":"ref_36","unstructured":"(2018, October 15). The Intel Edison Module | IoT. Available online: https:\/\/software.intel.com\/en-us\/iot\/hardware\/edison."},{"key":"ref_37","unstructured":"(2018, October 15). Arduino TIAN. Available online: https:\/\/www.arduino.cc\/en\/Main\/ArduinoBoardTian."},{"key":"ref_38","unstructured":"(2018, October 15). Arduino MKR WIFI 1010. Available online: https:\/\/store.arduino.cc\/arduino-mkr-wifi-1010."},{"key":"ref_39","unstructured":"(2018, October 15). LightBlue Bean. Available online: https:\/\/punchthrough.com\/products\/bean."},{"key":"ref_40","unstructured":"(2018, October 15). ESP32 Overview | Espressif Systems. Available online: https:\/\/espressif.com\/en\/products\/hardware\/esp32\/overview."},{"key":"ref_41","unstructured":"(2018, October 15). Particle Photon (Wi-Fi). Available online: https:\/\/www.particle.io\/products\/hardware\/photon-wifi-dev-kit."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TC.2016.2623609","article-title":"Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things","volume":"66","author":"Liu","year":"2017","journal-title":"IEEE Trans. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Gielata, A., Russek, P., and Wiatr, K. (2008, January 14\u201317). AES hardware implementation in FPGA for algorithm acceleration purpose. Proceedings of the 2008 International Conference on Signals and Electronic Systems, Krakow, Poland.","DOI":"10.1109\/ICSES.2008.4673377"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1109\/TVLSI.2008.2000450","article-title":"Cost-Efficient SHA Hardware Accelerators","volume":"16","author":"Chaves","year":"2008","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018, January 4\u20137). A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices. Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain.","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (2017, January 10\u201311). Security Attacks in IoT: A Survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref_47","first-page":"25","article-title":"UML Modeling of Physical and Data Link Layer Security Attacks in WSN","volume":"70","author":"Uke","year":"2013","journal-title":"Int. J. Comput. Appl."},{"key":"ref_48","unstructured":"Sagduyu, Y.E., Berryt, R.A., and Ephremidesi, A. (June, January 31). Wireless jamming attacks under dynamic traffic uncertainty. Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Avignon, France."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., and Casey, W. (2016). On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks. Decision and Game Theory for Security, Springer International Publishing.","DOI":"10.1007\/978-3-319-47413-7"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/s11276-007-0088-8","article-title":"A Game-theoretic Analysis of Denial of Service Attacks in Wireless Random Access","volume":"15","author":"Sagduyu","year":"2009","journal-title":"Wirel. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Shwartz, O., Mathov, Y., Bohadana, M., Oren, Y., and Elovici, Y. (2018). Reverse Engineering IoT Devices: Effective Techniques and Methods. IEEE Internet Things J., 1.","DOI":"10.1007\/978-3-319-75208-2_1"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Das, K., and Taggu, A. (2014, January 24\u201327). A comprehensive analysis of DoS attacks in Mobile Adhoc Networks. Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India.","DOI":"10.1109\/ICACCI.2014.6968561"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/JIOT.2018.2799820","article-title":"EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis","volume":"5","author":"Liu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1109\/JIOT.2017.2685596","article-title":"Securing SDN Infrastructure of IoT\u2013Fog Networks From MitM Attacks","volume":"4","author":"Li","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1109\/TCYB.2017.2716115","article-title":"Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks","volume":"48","author":"Chen","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/JIOT.2014.2344013","article-title":"Sybil Attacks and Their Defenses in the Internet of Things","volume":"1","author":"Zhang","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and Other Botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCE.2017.2684982","article-title":"Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly","volume":"6","author":"Park","year":"2017","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Limbasiya, T., and Karati, A. (2018, January 10\u201312). Cryptanalysis and improvement of a mutual user authentication scheme for the Internet of Things. Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand.","DOI":"10.1109\/ICOIN.2018.8343105"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Gupta, D.S., Biswas, G.P., and Nandan, R. (2018, January 15\u201317). Security weakness of a lattice-based key exchange protocol. Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India.","DOI":"10.1109\/RAIT.2018.8389018"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Maier, A., Sharp, A., and Vagapov, Y. (2017, January 12\u201315). Comparative analysis and practical implementation of the ESP32 microcontroller module for the internet of things. Proceedings of the 2017 Internet Technologies and Applications (ITA), Wrexham, UK.","DOI":"10.1109\/ITECHA.2017.8101926"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Allafi, I., and Iqbal, T. (2017, January 22\u201325). Design and implementation of a low cost web server using ESP32 for real-time photovoltaic system monitoring. Proceedings of the 2017 IEEE Electrical Power and Energy Conference (EPEC), Saskatoon, SK, Canada.","DOI":"10.1109\/EPEC.2017.8286184"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Kodali, R.K., and Yerroju, S. (2017, January 21\u201323). IoT based smart emergency response system for fire hazards. Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Tumkur, India.","DOI":"10.1109\/ICATCCT.2017.8389132"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","article-title":"Fog Computing May Help to Save Energy in Cloud Computing","volume":"34","author":"Jalali","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"6894","DOI":"10.1109\/ACCESS.2017.2692522","article-title":"EC-CENTRIC: An Energy- and Context-Centric Perspective on IoT Systems and Protocol Design","volume":"5","author":"Biason","year":"2017","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"15667","DOI":"10.1109\/ACCESS.2017.2686092","article-title":"Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond","volume":"5","author":"Arshad","year":"2017","journal-title":"IEEE Access"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1109\/JIOT.2015.2413397","article-title":"An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments","volume":"2","author":"Pan","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Naccache, D. (2001). Software Implementation of the NIST Elliptic Curves Over Prime Fields. Topics in Cryptology\u2014CT-RSA 2001, Springer.","DOI":"10.1007\/3-540-45353-9"},{"key":"ref_69","unstructured":"Laud, P. (2012). Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations. Information Security Technology for Applications, Springer."},{"key":"ref_70","unstructured":"Jankowski, K., Laurent, P., and O\u2019Mahony, A. (2018, October 15). Intel Polynomial Multiplication Instruction and its Usage for Elliptic Curve Cryptography. Available online: https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/polynomial-multiplication-instructions-paper.pdf."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Meier, W., and Mukhopadhyay, D. (2014). Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. Progress in Cryptology\u2014INDOCRYPT 2014, Springer.","DOI":"10.1007\/978-3-319-13039-2"},{"key":"ref_72","unstructured":"(2018, October 15). SSL Library Mbed TLS\/PolarSSL. Available online: https:\/\/tls.mbed.org\/."},{"key":"ref_73","unstructured":"(2018, October 15). Mbed TLS Core Features. Available online: https:\/\/tls.mbed.org\/core-features."},{"key":"ref_74","unstructured":"(2018, October 15). SEC 2: Recommended Elliptic Curve Domain Parameters. Available online: http:\/\/www.secg.org\/SEC2-Ver-1.0.pdf."},{"key":"ref_75","unstructured":"(2018, October 15). National Institute of Standards and Technology, Available online: https:\/\/www.nist.gov\/."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Ryan, P.Y.A., Naccache, D., and Quisquater, J.J. (2016). Dual EC: A Standardized Back Door. The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, Springer.","DOI":"10.1007\/978-3-662-49301-4"},{"key":"ref_77","unstructured":"(2018, October 15). Standards for Efficient Cryptography Group. Available online: http:\/\/www.secg.org\/."},{"key":"ref_78","unstructured":"(2018, October 15). Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation. Available online: https:\/\/tools.ietf.org\/html\/rfc5639."},{"key":"ref_79","unstructured":"(2018, October 15). IETF | Internet Engineering Task Force. Available online: https:\/\/www.ietf.org\/."},{"key":"ref_80","unstructured":"(2018, October 15). Elliptic Curve Performance: NIST vs Brainpool. Available online: https:\/\/tls.mbed.org\/kb\/cryptography\/elliptic-curve-performance-nist-vs-brainpool."},{"key":"ref_81","unstructured":"(2018, October 15). Open SSL. Available online: https:\/\/www.openssl.org\/."},{"key":"ref_82","unstructured":"(2018, October 15). Orange Pi Pc. Available online: http:\/\/www.orangepi.org\/orangepipc\/."},{"key":"ref_83","unstructured":"(2018, October 15). Crypto Engine Support. Available online: http:\/\/sunxi.montjoie.ovh\/."},{"key":"ref_84","unstructured":"Espressif IoT Development Framework (2018, October 15). Official development framework for ESP32. Available online: https:\/\/github.com\/espressif\/esp-idf."},{"key":"ref_85","unstructured":"(2018, October 15). MinGW | Minimalist GNU for Windows. Available online: http:\/\/www.mingw.org\/."},{"key":"ref_86","unstructured":"(2018, October 15). FreeRTOS\u2014Market leading RTOS (Real Time Operating System) for Embedded Systems with Internet of Things Extensions. Available online: https:\/\/www.freertos.org\/."},{"key":"ref_87","unstructured":"(2018, October 15). Armbian: Linux for ARM Development Boards. Available online: https:\/\/www.armbian.com\/."},{"key":"ref_88","unstructured":"(2018, October 15). Python.org. Available online: https:\/\/www.python.org\/."},{"key":"ref_89","unstructured":"(2018, October 15). Pi-ina219 1.2.0. Available online: https:\/\/pypi.org\/project\/pi-ina219\/."},{"key":"ref_90","unstructured":"Polk, T., McKay, K., and Chokhani, S. (2018, October 15). Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-52\/archive\/2005-06-09."},{"key":"ref_91","unstructured":"(2018, October 15). The Transport Layer Security (TLS) Protocol Version 1.3 draft-ietf-tls-tls13-28. Available online: https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-28."},{"key":"ref_92","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018, January 5\u20137). Impact of Clock Frequency on the Performance and Consumption of a Secure IoT Node. Proceedings of the XXXIII Simposium Nacional de la Union Cient\u00edfica Internacional de Radio (URSI), Granada, Spain."},{"key":"ref_93","unstructured":"(2018, October 15). Faker Webpage. Available online: https:\/\/pypi.python.org\/pypi\/Faker\/0.7.3."},{"key":"ref_94","unstructured":"Xu, R., Li, Z., Wang, C., and Ni, P. (2003, January 19\u201322). Impact of data compression on energy consumption of wireless-networked handheld devices. Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, RI, USA."},{"key":"ref_95","unstructured":"(2018, October 15). NTP: The Network Time Protocol. Available online: http:\/\/www.ntp.org\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3868\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:29:02Z","timestamp":1760196542000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,10]]},"references-count":95,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18113868"],"URL":"https:\/\/doi.org\/10.3390\/s18113868","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,10]]}}}