{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:54Z","timestamp":1774541634769,"version":"3.50.1"},"reference-count":54,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T00:00:00Z","timestamp":1545264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"],"award-info":[{"award-number":["ED431C 2016-045, ED341D R2016\/012, ED431G\/01"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Agencia Estatal de Investigaci\u00f3n of Spain  and ERDF funds of the EU (AEI\/FEDER, UE)","award":["TEC2013-47141-C4-1-R, TEC2015-69648-REDC, TEC2016-75067-C4-1-R"],"award-info":[{"award-number":["TEC2013-47141-C4-1-R, TEC2015-69648-REDC, TEC2016-75067-C4-1-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Modern Internet of Things (IoT) systems have to be able to provide high-security levels, but it is difficult to accommodate computationally-intensive cryptographic algorithms on the resource-constrained hardware used to deploy IoT end nodes. Although this scenario brings the opportunity for using advanced security mechanisms such as Transport Layer Security (TLS), several configuration factors impact both the performance and the energy consumption of IoT systems. In this study, two of the most used TLS authentication algorithms (ECDSA and RSA) were compared when executed on a resource-constrained IoT node based on the ESP32 System-on-Chip (SoC), which was tested at different clock frequencies (80, 160 and 240 MHz) when providing different security levels (from 80 to 192 bits). With every tested configuration, energy consumption and average time per transaction were measured. The results show that ECDSA outperforms RSA in all performed tests and that certain software implementations may lead to scenarios where higher security-level alternatives outperform cryptosystems that are theoretically simpler and lighter in terms of energy consumption and data throughput. Moreover, the performed experiments allow for concluding that higher clock frequencies provide better performance in terms of throughput and, in contrast to what may be expected, less energy consumption.<\/jats:p>","DOI":"10.3390\/s19010015","type":"journal-article","created":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T12:54:36Z","timestamp":1545310476000},"page":"15","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9891-4553","authenticated-orcid":false,"given":"Manuel","family":"Su\u00e1rez-Albela","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3801-012X","authenticated-orcid":false,"given":"Luis","family":"Castedo","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago M.","family":"Fern\u00e1ndez-Caram\u00e9s","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Faculty of Computer Science, Universidade da Coru\u00f1a, 15071 A Coru\u00f1a, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Fern\u00e1ndez-Caram\u00e9s, T.M., Su\u00e1rez-Albela, M., Castedo, L., and Gonz\u00e1lez-L\u00f3pez, M. (2016). A Review on Internet of Things for Defense and Public Safety. Sensors, 16.","DOI":"10.3390\/s16101644"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Crepaldi, P.C., and Pimenta, T.C. (2017). A methodology for evaluating security in commercial RFID systems. Radio Frequency Identification, IntechOpen.","DOI":"10.5772\/62606"},{"key":"ref_3","first-page":"586","article-title":"A Comprehensive Study of Security of Internet-of-Things","volume":"5","author":"Nia","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P., and Castedo, L. (2018, January 4\u20137). A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices. Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain.","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T., Fraga-Lamas, P., and Castedo, L. (2017). A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications. Sensors, 17.","DOI":"10.3390\/s17091978"},{"key":"ref_6","unstructured":"(2017, July 28). Datagram Transport Layer Security Version 1.2. Available online: https:\/\/tools.ietf.org\/html\/rfc6347."},{"key":"ref_7","unstructured":"(2017, July 28). Open SSL. Available online: https:\/\/www.openssl.org\/."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kim, M., Lee, J., Kim, Y., and Song, Y.H. (2018, January 5\u20138). An analysis of energy consumption under various memory mappings for FRAM-based IoT devices. Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore.","DOI":"10.1109\/WF-IoT.2018.8355212"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","article-title":"Management of resource constrained devices in the internet of things","volume":"50","author":"Sehgal","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/MCOM.2018.1700299","article-title":"IoT in the Fog: A Roadmap for Data-Centric IoT Development","volume":"56","author":"Oteafy","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MC.2015.207","article-title":"The Benefits of Self-Awareness and Attention in Fog and Mist Computing","volume":"48","author":"Preden","year":"2015","journal-title":"Computer"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Bangui, H., Rakrak, S., Raghay, S., and Buhnova, B. (2018). Moving to the Edge-Cloud-of-Things: Recent Advances and Future Research Directions. Electronics, 7.","DOI":"10.3390\/electronics7110309"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","article-title":"Fog Computing May Help to Save Energy in Cloud Computing","volume":"34","author":"Jalali","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Su\u00e1rez-Albela, M., Fern\u00e1ndez-Caram\u00e9s, T., Fraga-Lamas, P., and Castedo, L. (2018). A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors, 18.","DOI":"10.3390\/s18113868"},{"key":"ref_15","unstructured":"Polk, T., McKay, K., and Chokhani, S. (2018, October 15). Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-52\/rev-1\/final."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/TCE.2017.015014","article-title":"A smart home energy management system using IoT and big data analytics approach","volume":"63","author":"Zualkernan","year":"2017","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ali, B., and Awad, A. (2018). Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors, 18.","DOI":"10.3390\/s18030817"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Grabovica, M., Popi\u0107, S., Pezer, D., and Kne\u1e91evi\u0107, V. (2016, January 1\u20132). Provided security measures of enabling technologies in Internet of Things (IoT): A survey. Proceedings of the 2016 Zooming Innovation in Consumer Electronics International Conference (ZINC), Novi Sad, Serbia.","DOI":"10.1109\/ZINC.2016.7513647"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/COMST.2016.2515516","article-title":"M2M Security: Challenges and Solutions","volume":"18","author":"Barki","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (2017, January 10\u201311). Security Attacks in IoT: A Survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P. (2015, January 21\u201325). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings of the 2015 International Workshop on Secure Internet of Things (SIoT), Vienna, Austria.","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., and Neri, A. (2014, January 12\u201315). A federated architecture approach for Internet of Things security. Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy.","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Addo, I.D., Ahamed, S.I., Yau, S.S., and Buduru, A. (July, January 27). A Reference Architecture for Improving Security and Privacy in Internet of Things Applications. Proceedings of the 2014 IEEE International Conference on Mobile Services, Anchorage, AK, USA.","DOI":"10.1109\/MobServ.2014.24"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhao, K., and Ge, L. (2013, January 14\u201315). A Survey on the Internet of Things Security. Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security, Leshan, China.","DOI":"10.1109\/CIS.2013.145"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hummen, R., and Wehrle, K. (2013, January 7\u201310). Standards-based end-to-end IP security for the Internet of Things. Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP), G\u00f6ttingen, Germany.","DOI":"10.1109\/ICNP.2013.6733648"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Van den Abeele, F., Vandewinckele, T., Hoebeke, J., Moerman, I., and Demeester, P. (2015, January 7\u20139). Secure communication in IP-based wireless sensor networks via a trusted gateway. Proceedings of the 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore.","DOI":"10.1109\/ISSNIP.2015.7106963"},{"key":"ref_27","unstructured":"(2017, July 28). Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Available online: https:\/\/tools.ietf.org\/html\/rfc7250."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tehranipoor, M., and Wang, C. (2012). Security Based on Physical Unclonability and Disorder. Introduction to Hardware Security and Trust, Springer.","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref_29","unstructured":"Lenstra, A.K. (2004). Key Lengths Contribution to The Handbook of Information Security, Wiley."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Barker, E. (2016). Recommendation for Key Management\u2014Part 1: General (Revision 4).","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-42001-6_9","article-title":"Universal security from bits and mips to pools, lakes-and beyond","volume":"8260","author":"Lenstra","year":"2013","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_32","unstructured":"(2017, July 28). The Transport Layer Security (TLS) Protocol Version 1.2. Available online: https:\/\/tools.ietf.org\/html\/rfc5246."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wu, S., and Zhu, Y. (2006, January 25\u201328). A Resource Efficient Architecture for RSA and Elliptic Curve Cryptosystems. Proceedings of the 2006 International Conference on Communications, Circuits and Systems, Guilin, China.","DOI":"10.1109\/ICCCAS.2006.285150"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Savari, M., Montazerolzohour, M., and Thiam, Y.E. (2012, January 26\u201328). Comparison of ECC and RSA algorithm in multipurpose smart card application. Proceedings of the 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia.","DOI":"10.1109\/CyberSec.2012.6246121"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S.C. (2004, January 11\u201313). Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Proceedings of the 6th International Workshop, Cambridge, MA, USA.","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref_36","unstructured":"Maletsky, K. (2015). RSA vs. ECC Comparison for Embedded Systems, Atmel."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/TLA.2014.6894012","article-title":"Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems","volume":"12","author":"Feltrim","year":"2014","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Noroozi, E., Kadivar, J., and Shafiee, S.H. (2010, January 1\u20133). Energy analysis for wireless sensor networks. Proceedings of the 2010 2nd International Conference on Mechanical and Electronics Engineering, Kyoto, Japan.","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/JSYST.2015.2469676","article-title":"An Energy-Efficient Architecture for the Internet of Things (IoT)","volume":"11","author":"Kaur","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Lazaro, A., Villarino, R., and Girbau, D. (2018). A Survey of NFC Sensors Based on Energy Harvesting for IoT Applications. Sensors, 18.","DOI":"10.3390\/s18113746"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2017.1600218CM","article-title":"Efficient Energy Management for the Internet of Things in Smart Cities","volume":"55","author":"Ejaz","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_42","first-page":"1680","article-title":"RF Energy Harvesting and Transfer for Spectrum Sharing Cellular IoT Communications in 5G Systems","volume":"17","author":"Ercan","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Bagula, A., Abidoye, A.P., and Zodi, G.-A.L. (2016). Service-Aware Clustering: An Energy-Efficient Model for the Internet-of-Things. Sensors, 16.","DOI":"10.3390\/s16010009"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"11334","DOI":"10.3390\/s120811334","article-title":"Service-Aware Clustering: An Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things","volume":"12","author":"Gao","year":"2012","journal-title":"Sensors"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","article-title":"A study of the energy consumption characteristics of cryptographic algorithms and security protocols","volume":"5","author":"Potlapally","year":"2006","journal-title":"IEEE Trans. Mobile Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1016\/j.jcss.2014.12.022","article-title":"Modeling energy-efficient secure communications in multi-mode wireless mobile devices","volume":"81","author":"Castiglione","year":"2015","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_47","unstructured":"(2018, October 15). ESP32 Overview | Espressif Systems. Available online: https:\/\/espressif.com\/en\/products\/hardware\/esp32\/overview."},{"key":"ref_48","unstructured":"(2017, July 28). ESP32-DecKitC. Available online: https:\/\/www.espressif.com\/en\/products\/hardware\/esp32-devkitc\/overview."},{"key":"ref_49","unstructured":"(2018, October 15). Orange Pi, Pc. Available online: http:\/\/www.orangepi.org\/orangepipc\/."},{"key":"ref_50","unstructured":"(2018, October 15). Espressif IoT Development Framework. Official Development Framework for ESP32. Available online: https:\/\/github.com\/espressif\/esp-idf."},{"key":"ref_51","unstructured":"(2018, October 15). SSL Library Mbed TLS\/PolarSSL. Available online: https:\/\/tls.mbed.org\/."},{"key":"ref_52","unstructured":"(2018, October 15). Faker Webpage. Available online: https:\/\/pypi.python.org\/pypi\/Faker\/0.7.3."},{"key":"ref_53","unstructured":"(2018, October 15). The Transport Layer Security (TLS) Protocol Version 1.3. Available online: https:\/\/tools.ietf.org\/html\/rfc8446."},{"key":"ref_54","unstructured":"(2018, October 15). ESP32 Datasheet, Version 2.1. Available online: https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp32_datasheet_en.pdf."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/15\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:35:17Z","timestamp":1760196917000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,20]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["s19010015"],"URL":"https:\/\/doi.org\/10.3390\/s19010015","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,20]]}}}