System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.00 |
Wireless sensor networks are typically used in different control and monitoring applications. In these applications resource-constrained sensor nodes gather information from the environment and possibly execute control commands based on the content of gathered information. The information transferred in a wireless sensor network can be very sensitive and therefore must be kept secret from outsiders. In this paper RC5 based encryption and CMAC authentication are used to obtain data confidentiality, freshness, replay protection, authentication, and integrity. These features enhance data security but can decrease sensor network operability because of added computation and communication load. This paper discusses the trade-offs between added security and sensor and sensor network performance. The focus is on how energy consumption and computation time are increased due to utilization of different security features and levels.