Green Computing
Green Computing
Sugata Gangopadhyay
Green Computing Overview (1/2)
• Definition: Green computing involves the design, development, and
implementation of computing technologies and practices to minimize
environmental impact.
• Goals:
• Reduce energy consumption.
• Decrease electronic waste.
• Promote sustainability in technology use and manufacturing.
Green Computing Overview (2/2)
• Examples:
• Cloud computing to optimize resources.
• Energy-efficient processors and hardware.
• Virtualization for reducing physical server needs.
Moore's Law
• Moore's Law is named after Gordon E. Moore, a co-founder of Intel
Corporation, who observed in a 1965 paper that the number of
transistors on an integrated circuit (IC) doubles approximately every
two years while the cost per transistor decreases. This observation
has since become a guiding principle for the semiconductor industry
and is often extended to imply the exponential growth of
computational power over time.
Significance of Moore's Law in Energy-
Efficient Computing (1/3)
• Miniaturization and Energy Efficiency: As transistors become smaller,
they consume less power while providing higher performance. This
reduction in size and energy usage has enabled more energy-efficient
devices and systems.
𝐸 = 𝑦𝑖 ⋅ 𝐸𝑠 + 𝑃𝑐 − 𝐸𝑟
𝑖=1
where 𝐸𝑠 is the energy consumption of an active server.
Constraints
• Task Assignment: Each task must be assigned to one server.
𝑁
𝑥𝑖𝑗 = 1 ∀𝑗 ∈ 1, 2, … , 𝑀
𝑖=1
• Server Capacity: The total task load on a server must not exceed its
capacity.
𝑀
𝑥𝑖𝑗 ⋅ 𝑇𝑗 ≤ 𝑦𝑖 ⋅ 𝐶𝑖 ∀ 𝑖 ∈ 1,2, … , 𝑁
𝑗=1
Constraints
• Server Activation: A server is active if at least one task is assigned to
it.
𝑦𝑖 ≥ 𝑥𝑖𝑗 ∀𝑖, 𝑗
• Cooling Energy: Cooling power must cover the heat generated by
active servers.
𝑁
𝑃𝑐 ≥ 𝛼 ⋅ 𝑦𝑖 ⋅ 𝐸𝑠
𝑖=1
• Renewable Energy: Ensure renewable energy usage doesn’t exceed
its availability.
𝑃𝑐 − 𝐸𝑟 ≤ 0
Interpretation
For Alice 𝑘 = 𝑔𝑏𝑎 (mod 𝑝) and for Bob 𝑘 = 𝑔𝑎𝑏 (mod 𝑝).
Since 𝑎𝑏 ≡ 𝑏𝑎 (mod 𝑝 − 1), the two parties have computed the same value.
Example: Diffie-Hellman protocol
• Let 𝑝 = 5 and 𝑔 = 2. Suppose Alice chooses 𝑎 = 2 and
sends
𝑔𝑎 = 22 mod 5 = 4
Suppose Bob chooses 𝑏 = 3 and sends 𝑔𝑏 = 23 mod 5 = 3
to Alice.
• In this way Alice and Bob agrees upon the secret key 𝐾 = 4.
Security of Diffie-Hellman protocol
• Let 𝑝 be a prime number, 𝑔 ∈ ℤ𝑝∗ is a
generator, and ℎ = 𝑔𝑎 mod 𝑝.
•Examples: Smart sensors, wearables, home automation systems, and industrial IoT.
•Use Case:
•Securely establishing shared encryption keys for communication between IoT devices.
•Approaches:
•Lightweight cryptographic protocols optimized for constrained devices.
Mobile Devices and Applications
• Examples: Smartphones, tablets, and mobile apps using end-to-end
encryption.
• Why Energy Efficiency Matters:
• Cryptographic operations during secure messaging or secure browsing can
impact battery life.
• Use Case:
• DHKE is used in protocols like Signal for secure key exchange in messaging
apps.
• Approaches:
• Leveraging elliptic curve variants (ECDH) for reduced computational
complexity.
Wireless Sensor Networks (WSNs)
• xamples: Environmental monitoring, health monitoring, and disaster
response systems.
• Why Energy Efficiency Matters:
• Sensors often have limited energy reserves and operate in remote locations.
• Use Case:
• Establishing secure communication channels between sensors.
• Approaches:
• Using optimized DHKE algorithms tailored for minimal energy consumption.
Vehicular Ad Hoc Networks (VANETs)
•Use Case:
•Secure communication between vehicles and infrastructure (V2I/V2V).
•Approaches:
•Energy-efficient cryptographic modules integrated into vehicular hardware.
Low-Power Wide Area Networks (LPWANs)
•Examples: LoRaWAN, Sigfox, and other networks for long-range, low-power communication.
•Use Case:
•Secure key establishment between endpoints and base stations.
•Approaches:
•Incorporating lightweight DHKE implementations to align with LPWAN constraints.
Secure Embedded Systems
• Examples: Medical implants, smart cards, and RFID systems.
• Why Energy Efficiency Matters:
• These systems have strict size, power, and heat dissipation constraints.
• Use Case:
• Secure initialization and communication in embedded devices.
• Approaches:
• Hardware-based acceleration for energy-efficient DHKE.
Cloud-Connected Devices with Intermittent
Connectivity
• Examples: Remote monitoring stations or agricultural IoT.
• Why Energy Efficiency Matters:
• Devices rely on sporadic network access and limited local energy sources like
solar panels.
• Use Case:
• Secure key exchange to encrypt data uploaded to the cloud.
• Approaches:
• Efficient DHKE combined with session resumption to reduce frequent re-
negotiations.
Satellite Communication Systems
•Examples: CubeSats, nanosatellites, and space probes.
•Use Case:
•Secure key exchange for data transmission to and from ground stations.
•Approaches:
•Lightweight DHKE algorithms designed for space-grade hardware.
Optimizing DHKE for Energy Efficiency
•Elliptic Curve Diffie-Hellman (ECDH):
•Uses smaller key sizes for the same security level as traditional DHKE,
reducing computational overhead.
•Pre-computation:
•Offloading heavy computations during idle periods.
•Hardware Acceleration:
•Utilizing dedicated cryptographic hardware for low-power operations.
•Protocol Design:
•Minimizing unnecessary key exchanges and handshake steps.
Optimizing DHKE for Energy Efficiency
• By optimizing DHKE for these scenarios, we can achieve secure
communication while minimizing energy consumption, making it
suitable for modern, resource-constrained systems.
Diffie-Hellman key exchange in secure
systems
• The Diffie-Hellman key exchange (DHKE) is widely used in secure
systems, especially in contexts where energy efficiency is critical due
to resource constraints. Below are key areas where DHKE is used,
highlighting the importance of energy efficiency:
Elliptic curve addition
Comparison of RSA and Elliptic Curve Diffie-
Hellman (ECDH) Computation Costs
Computation Cost High (due to large key Low (smaller key size and
size) operations)
Energy Efficiency Low (more power High (optimized for
needed for resource constraints)
computation)
Comparison of RSA, ECDH, and NIST Standard PQC Computation Costs
Aspect RSA (e.g., 2048- ECDH (e.g., 256- NIST Standard
bit keys) bit keys) PQC (e.g.,
CRYSTALS-
Kyber)
Key Size 2048 bits 256 bits Public: ~1184
bytes, Private:
~2400 bytes (for
Kyber-512)
Security Level (bits) 112 bits 128 bits 128 bits (for
Kyber-512)
Computation Cost High (large key Low (smaller key Moderate
size) size and (matrix-based
operations) arithmetic)
Energy Efficiency Low High (optimized Moderate (larger
(computationally for small arithmetic but
expensive) devices) optimized
designs)
Quantum Resistance Not resistant Not resistant Resistant to
quantum attacks