System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IEEE 802.15.4 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensor Networks
IEEE 802.15.4 Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensor Networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Reliability and scalability of wireless Kilavi building control platform
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A middleware-based approach for heterogeneous wireless sensor networks
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Hi-index | 0.00 |
Information transferred in a wireless sensor network can be sensitive, hence it is vital to secure the data on the network. Enhancing the network's security affects the network operation, by increasing the data's handling time. In this paper, the trade-offs between enhanced security and sensor network performance is discussed. The studies concentrate on the increase in computation time and energy consumption as enhanced security features and levels are utilized. This paper presents, RC5-based encryption and CMAC authentication, used to achieve data confidentiality, freshness, replay protection, authentication, and integrity. These features enhance data security but can also decrease sensor network operability, because of the added load in computation and communication. By selecting a suitable algorithm and operation conditions for encryption and authentication, the data security in wireless sensor networks can be improved with minor resource losses.