Open Access iconOpen Access

ARTICLE

crossmark

Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms

Ehan Sohn1, Sangmyung Lee1, Sunggon Kim1, Kiwook Sohn1, Manish Kumar2, Yongseok Son3,*

1 Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, 01811, Republic of Korea
2 Department of Computer Engineering (AI-ML), Marwadi University, Rajkot, 360003, Gujarat, India
3 School of Computer Science and Engineering, Chung-Ang University, Seoul, 06974, Republic of Korea

* Corresponding Author: Yongseok Son. Email: email

(This article belongs to the Special Issue: Cutting-Edge Security and Privacy Solutions for Next-Generation Intelligent Mobile Internet Technologies and Applications)

Computer Modeling in Engineering & Sciences 2025, 145(2), 2761-2785. https://doi.org/10.32604/cmes.2025.070888

Abstract

With the accelerated growth of the Internet of Things (IoT), real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local. Since these devices often handle personal information under limited resources, cryptographic algorithms must be executed efficiently. Their computational characteristics strongly affect system performance, making it necessary to analyze resource impact and predict usage under diverse configurations. In this paper, we analyze the phase-level resource usage of AES variants, ChaCha20, ECC, and RSA on an edge device and develop a prediction model. We apply these algorithms under varying parallelism levels and execution strategies across key generation, encryption, and decryption phases. Based on the analysis, we train a unified Random Forest model using execution context and temporal features, achieving R2 values up to 0.994 for power and 0.988 for temperature. Furthermore, the model maintains practical predictive performance even for cryptographic algorithms not included during training, demonstrating its ability to generalize across distinct computational characteristics. Our proposed approach reveals how execution characteristics and resource usage interacts, supporting proactive resource planning and efficient deployment of cryptographic workloads on edge devices. As our approach is grounded in phase-level computational characteristics rather than in any single algorithm, it provides generalizable insights that can be extended to a broader range of cryptographic algorithms that exhibit comparable phase-level execution patterns and to heterogeneous edge architectures.

Keywords

Internet of Things (IoT); cryptography; power efficient computing; performance modeling

Cite This Article

APA Style
Sohn, E., Lee, S., Kim, S., Sohn, K., Kumar, M. et al. (2025). Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms. Computer Modeling in Engineering & Sciences, 145(2), 2761–2785. https://doi.org/10.32604/cmes.2025.070888
Vancouver Style
Sohn E, Lee S, Kim S, Sohn K, Kumar M, Son Y. Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms. Comput Model Eng Sci. 2025;145(2):2761–2785. https://doi.org/10.32604/cmes.2025.070888
IEEE Style
E. Sohn, S. Lee, S. Kim, K. Sohn, M. Kumar, and Y. Son, “Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms,” Comput. Model. Eng. Sci., vol. 145, no. 2, pp. 2761–2785, 2025. https://doi.org/10.32604/cmes.2025.070888



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 180

    View

  • 94

    Download

  • 0

    Like

Share Link