Power analysis of embedded software: a first step towards software power minimization
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special issue on low-power design
Energy characterization of embedded real-time operating systems
ACM SIGARCH Computer Architecture News - Special Issue: PACT 2001 workshops
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Hybrid simulation for embedded software energy estimation
Proceedings of the 42nd annual Design Automation Conference
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
Scheduling Security-Critical Real-Time Applications on Clusters
IEEE Transactions on Computers
Improving security for periodic tasks in embedded systems through scheduling
ACM Transactions on Embedded Computing Systems (TECS)
Automated Energy/Performance Macromodeling of Embedded Software
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
HPCC '12 Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems
On the fundamentals of leakage aware real-time DVS scheduling for peak temperature minimization
Journal of Systems Architecture: the EUROMICRO Journal
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Hi-index | 0.00 |
Security, energy and timing are three main concerns for embedded real-time systems, especially in battery-powered security-critical embedded systems. Existing researches on cryptographic algorithms seriously ignored the timing properties and their running environments were supposed for general applications while not based on real-time operating systems. In this paper we make efforts to analyse both energy and time related characteristics of widely used cryptographic algorithms for data-sensitive embedded real-time systems. All our studies are based on empirical data measured from a widely used ARM9 developing platform which runs security-critical test tasks within the real-time operating systems @mC/OSII. To efficiently obtain precise and accuracy data, we use NI instrument and devise a well-defined data-processing method. Identifying the inherent characteristics of security algorithms, we propose a multi-dimensional analysis framework that reveals potential features cryptographic algorithms from the angles of power, speed, and unit energy cost. The energy and time features of most popular cryptographic algorithms including symmetric, asymmetric, and hash algorithms are well studied. In addition, some mathematical models are also built to help explain and investigate these features. Based on the experiments and analysis, we found some interesting results like (1) energy consumptions and time overheads of cryptographic algorithms are not linear functions of the size of plain text, (2) energy cost is near-linear to the execution time of each cryptographic algorithm under any data size due to the hard/software experimental platform constraint, (3) the power is a Gaussian function of data size while the processing speed and unit energy are polynomial functions of data size. We believe this paper could help the design of security-critical applications in embedded real-time systems, e.g. utilizing directly these experimental data of cryptographic algorithms or these fitting mathematical functions to optimize the energy consumption of security-critical real-time applications under limited resources and security requirements.