Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
ESRT: event-to-sink reliable transport in wireless sensor networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.01 |
In this paper, we consider interconnected IEEE 802.15.4 beacon enabled clusters with secure and reliable sensing. Clusters are interconnected via bridges implemented on cluster coordinators. Each cluster has to contribute a constant number of packets per second to the sink. Packets are protected with the Message Authentication Code which requires a secret key shared between each node and coordinator. We model network behavior under regular sensing traffic, power management, and periodic key exchanges. Three types of key exchange protocols of varying complexity are considered, and the impact of their communication and computation complexity on the network lifetime is evaluated. Our model and results can be used to determine network and security parameters in IEEE 802.15.4 based wireless sensor network when application requirements and known.