Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Efficient sensor node authentication via 3GPP mobile communication networks
Proceedings of the 17th ACM conference on Computer and communications security
The communication and computation cost of wireless security: extended abstract
Proceedings of the fourth ACM conference on Wireless network security
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Energy-Efficient cryptographic engineering paradigm
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Compact implementation and performance evaluation of block ciphers in ATtiny devices
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
(k, n) threshold distributed key exchange for HIP based internet of things
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks
Journal of Parallel and Distributed Computing
Low-energy encryption for medical devices: security adds an extra design dimension
Proceedings of the 50th Annual Design Automation Conference
Toward power consumption in wireless sensor networks routing technique
International Journal of Networking and Virtual Organisations
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and a computation point of view, based on practical measurements on the MICAz and TelosB sensors. We focus on the cost of two key agreement protocols: Kerberos and the Elliptic Curve Diffie-Hellman key exchange with authentication provided by the Elliptic Curve Digital Signature Algorithm (ECDH-ECDSA). We find that, in our context, Kerberos is around one order of magnitude less costly than the ECDH-ECDSA key exchange and confirm that it should be preferred in situations where a trusted third party is available. We also observe that the power dedicatedto communications can become a central concern when the nodes need to stay in listen mode, e.g. between the protocol rounds, even when reduced using a Low Power Listening (LPL) protocol. Therefore, listening should be considered when assessing the cost of cryptographic protocols on sensor nodes.