RC5-based security in wireless sensor networks: utilization and performance

  • Authors:
  • Juha Kukkurainen;Mikael Soini;Lauri Sydänheimo

  • Affiliations:
  • Rauma Research Unit, Department of Electronics, Tampere University of Technology, Rauma, Finland;Rauma Research Unit, Department of Electronics, Tampere University of Technology, Rauma, Finland;Rauma Research Unit, Department of Electronics, Tampere University of Technology, Rauma, Finland

  • Venue:
  • WSEAS Transactions on Computers
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information transferred in a wireless sensor network can be sensitive, hence it is vital to secure the data on the network. Enhancing the network's security affects the network operation, by increasing the data's handling time. In this paper, the trade-offs between enhanced security and sensor network performance is discussed. The studies concentrate on the increase in computation time and energy consumption as enhanced security features and levels are utilized. This paper presents, RC5-based encryption and CMAC authentication, used to achieve data confidentiality, freshness, replay protection, authentication, and integrity. These features enhance data security but can also decrease sensor network operability, because of the added load in computation and communication. By selecting a suitable algorithm and operation conditions for encryption and authentication, the data security in wireless sensor networks can be improved with minor resource losses.