Skip to main content

Advertisement

Log in

Energy Efficient Data Encryption Techniques in Smartphones

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing and storage. Managing security of mobile data is a necessary feature of every network and mostly encryption is used to avoid security breaches. The major challenge is that, mobile devices are very small with shortage of resources, on the other hand encryption of data requires extra energy. It is necessary to minimize energy requirements for encryption of data. For this experimental research, an android based application is developed, which optimize energy requirements for both single and double encryption techniques. AES and Blowfish encryption algorithms are used with different files sizes to test the energy requirements for single encryption, it is also examined that energy consumed by Blowfish is 119.311% more than AES. For double encryption methods, AES–Blowfish, Blowfish–AES and XTS–AES combinations of algorithms are used and energy usage is gathered. In double encryption XTS–AES consumed 13.26% less power consumption as compared to AES–Blowfish and 44.97% less then Blowfish–AES combination methods. Results of experiments revealed that AES is more energy efficient for single encryption and for double encryption XTS–AES combination requires less energy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Halpert, B. (2004). Mobile device security. In Proceedings of the 1st annual conference on information security curriculum development. Kennesaw, Georgia: ACM.

  2. Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers and Security, 34, 47–66.

    Article  Google Scholar 

  3. Pfitzmann, A., Pfitzmann, B., Schunter, M., & Waidner, M. (1997). Trusting mobile user devices and security modules. IEEE Computer Journal, 30, 61–68.

    Article  MATH  Google Scholar 

  4. Global mobile OS market share in sales to end users from 1st quarter 2009 to 2nd quarter 2017. https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/. Accessed Aug 2018.

  5. Alomari, M. A., & Samsudin, K. (2011). A framework for GPU-accelerated AES-XTS encryption in mobile devices. In TENCON 2011-2011 IEEE region 10 conference (pp. 144–148). IEEE.

  6. Gotzfried, J., & Muller, T. (2013). ARMORED: CPU-bound encryption for android-driven ARM devices. In Eighth international conference on availability, reliability and security (ARES), 2013 (pp. 161–168). IEEE.

  7. Digital in 2018: Worlds internet users pass the 4 billion marks. https://wearesocial.com/blog/2018/01/global-digital-report-2018. Accessed Aug 2018.

  8. Karri, R., & Mishra, P. (2003). Optimizing the energy consumed by secure wireless sessions: Wireless transport layer security case study. Mobile Networks and Applications, 8(2), 177–185.

    Article  Google Scholar 

  9. Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc.

    Google Scholar 

  10. Al-Subaihin, A. A., Sarro, F., Black, S., Capra, L., Harman, M., Jia, Y., et al. (2016). Clustering mobile apps based on mined textual features. In Proceedings of the 10th ACM/IEEE international symposium on empirical software engineering and measurement (p. 38). ACM.

  11. Elminaam, D. S., Abdul, H. M., Kader, A., & Hadhoud, M. M. (2008). Performance evaluation of symmetric encryption algorithms. IJCSNS International Journal of Computer Science and Network Security, 8(12), 280–286.

    Google Scholar 

  12. Lee, S., & Annavaram, M. (2012). Wireless body area networks: Where does energy go? In IEEE international symposium on workload characterization (IISWC), 2012 (pp. 25–35). IEEE.

  13. Chin, C. A., Crosby, G. V., Ghosh, T., & Murimi, R. (2012). Advances and challenges of wireless body area networks for healthcare applications. In International conference on computing, networking and communications (ICNC), 2012 (pp. 99–103). IEEE.

  14. Latr, B., Braem, B., Moerman, I., Blondia, C., & Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1), 1–18.

    Article  Google Scholar 

  15. Ameen, M. A., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93101.

    Article  Google Scholar 

  16. DelBello, C., Raihan, K., & Zhang, T. (2015). Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. Security and Communication Networks, 8(17), 2973–2980.

    Article  Google Scholar 

  17. Rogers, R., Lombardo, J., Mednieks, Z., & Meike, B. (2009). Android application development: Programming with the Google SDK. Sebastopol: O’Reilly Media Inc.

    Google Scholar 

  18. Gordon, M., & Zhang, L. (2011). Powertutor. http://ziyang.eecs.umich.edu/projects/powertutor/. Accessed Aug 2018.

  19. National Institute of Standards and Technology (NIST), Computer Security Division. Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD, USA, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed Aug 2018.

  20. Umaparvathi, M., & Varughese, D. K. (2010). Evaluation of symmetric encryption algorithms for MANETs. In IEEE International conference on computational intelligence and computing research (ICCIC), 2010 (pp. 1–3). IEEE.

  21. Stallings, W. (2006). Cryptography and network security (4th ed.). Upper Saddle River: Prentice Hall Publication (pp. 232–314).

    Google Scholar 

  22. Ambrosin, M., Conti, M., & Dargahi, T. (2015). On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems. ACM.

  23. Dworkin, M. (2010). Recommendation for block cipher modes of operation: The XTS–AES mode for confidentiality on storage devices. NIST special publication 800.

  24. Martin, Luther. (2010). XTS: A mode of AES for encrypting hard disks. IEEE Security and Privacy, 8(3), 68–69.

    Article  Google Scholar 

  25. LineageOS Android free and open-source operating system. https://www.lineageos.org/. Accessed Aug 2018.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghulam Mujtaba.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mujtaba, G., Tahir, M. & Soomro, M.H. Energy Efficient Data Encryption Techniques in Smartphones. Wireless Pers Commun 106, 2023–2035 (2019). https://doi.org/10.1007/s11277-018-5920-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5920-1

Keywords