Publication | Closed Access
Evaluation of Security Mechanisms in Wireless Sensor Networks
89
Citations
17
References
2005
Year
Unknown Venue
EngineeringWireless Sensor SystemInformation SecurityHardware SecuritySensor NetworksWireless SecurityCryptography AlgorithmsInternet Of ThingsHardware Security SolutionSecure ProtocolAd HocComputer EngineeringLightweight CryptographyComputer ScienceMobile ComputingData SecurityCryptographyWireless Sensor NetworksSecure RoutingSecuritySensor Node
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.
| Year | Citations | |
|---|---|---|
Page 1
Page 1