Modeling the interplay of information security and computing costs in embedded devices

Keywords: embedded devices, information security, computational costs, power consumption, processing time, lightweight cryptographic algorithms, modeling, resource intensity

Abstract

The article proposes a mathematical model that describes the interplay of information security and computing costs in embedded devices. Embedded systems, such as IoT devices, medical devices, and industrial controllers, operate under limited computing resources, which poses significant challenges to ensuring an adequate level of information security without overloading the system. The proposed model takes into account key parameters, including power consumption, processing time, memory size, and cryptographic protection level, which allows exploring the balance between security and resource consumption. The effectiveness of lightweight – PRESENT, SPECK, SIMON and standard cryptographic algorithms – Blowfish, AES were analyzed. The results of simulations performed in MATLAB and Python environments using libraries for cryptography testing demonstrate that lightweight algorithms provide significantly lower power consumption and processing time. This makes them an optimal choice for devices with limited resources. In particular, the SPECK and PRESENT algorithms showed the best results in terms of power consumption and speed, while AES, although providing a high level of security, is more resource-intensive. The practical significance of the developed model lies in its application for selecting optimal cryptographic solutions when designing energy-efficient embedded systems. The model can be integrated into design processes to optimize the security and performance of devices, which is especially important for IoT architectures, where energy conservation and data security are critical

References

1. Rozlomii, I., Yarmilko, A., & Naumenko, S. (2024, April). Data security of IoT devices with limited resources: challenges and potential solutions. In Proceedings of the 4th Edge Computing Workshop (doors 2024), Zhytomyr, Ukraine (pp. 85–96).
2. Aloseel, A., He, H., Shaw, C., & Khan, M. A. (2020). Analytical review of cybersecurity for embedded systems. IEEE Access, 9, 961-982.
3. Rozlomii I., Yarmilko A., Naumenko S., Mykhailovsky P. Modern encryption methods in IoT: hardware solutions and cryptographic libraries for data protection. Розвитки інформаційно-керуючих систем та технологій: монографія / Н.М. Аксак, Д. Антонов та ін.; під наук. ред. проф. В. Вичужаніна. Львів-Торунь: Ліха-Прес, 2024. С. 28–45. https://doi.org/10.36059/978-966-397-422-4.
4. Розломій І.О., Симонюк В.П., Науменко С.В., Михайловський П.В. (2024). Модель безпеки взаємопов’язаних обчислювальних пристроїв на основі полегшеної схеми шифрування для IoT. Комп’ютерно-інтегровані технології: освіта, наука, виробництво., (55), 191–198.
5. Yarmilko, A., Rozlomii, I., & Naumenko, S. (2024, May). Dependability of Embedded Systems in the Industrial Internet of Things: Information Security and Reliability of the Communication Cluster. In International Scientific-Practical Conference «Information Technology for Education, Science and Technics» (pp. 235–249). Cham: Springer Nature Switzerland.

Abstract views: 31
PDF Downloads: 14
Published
2025-02-13
How to Cite
Rozlomii, I., & Naumenko , S. (2025). Modeling the interplay of information security and computing costs in embedded devices. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (57), 139-145. https://doi.org/10.36910/6775-2524-0560-2024-57-16
Section
Computer science and computer engineering