Learn More
In this paper, we document the overhead in terms of runtime, firmware size, communication and energy consumption for Elliptic Curve Cryptography (ECC) signatures of modern ARM-based constrained devices. The experiments we have undertaken show that the cryptographic capabilities of the investigated Zolertia Re-Mote based on a TI's CC2538 chipset running(More)
We analyse accuracy, privacy, compression-ratio and computational overhead of selected aggregation and perturbation methods in the Internet of Things (IoT). We measure over a real-life data set of detailed energy consumption logs of a single family household. We modelled privacy by simple, threshold-driven machine-learning algorithms that extract features(More)
  • 1