Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
SPINS: security protocols for sensor networks
Wireless Networks
Truncated Differentials and Skipjack
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Flaws in Differential Cryptanalysis of Skipjack
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
A Survey of Lightweight-Cryptography Implementations
IEEE Design & Test
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks
HPCC '08 Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications
LRSA: Lightweight Rabbit Based Security Architecture for Wireless Sensor Networks
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
In this paper, we focus on the energy efficiency of secure communication in wireless sensor networks (WSNs). Our research considers link layer security of WSNs, investigating both the ciphers and the cryptographic implementation schemes, including aspects such as the cipher mode of operation and the establishment of initialization vectors (IVs). We evaluate the computational energy efficiency of different symmetric key ciphers considering both the algorithm characteristics and the effect of channel quality on cipher synchronization. Results show that the computational energy cost of block ciphers is less than that of stream ciphers when data are encrypted and transmitted through a noisy channel. We further investigate different factors affecting the communication energy cost of link layer cryptographic schemes, such as the size of payload, the mode of operation applied to a cipher, the distribution of the IV, and the quality of the communication channel. A comprehensive performance comparison of different cryptographic schemes is undertaken by developing an energy analysis model of secure data transmission at the link layer. This model is constructed considering various factors affecting both the computational cost and communication cost, and its appropriateness is verified by simulation results. In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for WSN applications and using a cipher feedback scheme for the cipher operation, thereby achieving energy efficiency without compromising the security in WSNs. Copyright © 2011 John Wiley & Sons, Ltd. (This study is based on “An analysis of link layer encryption schemes in wireless sensor networks” by X. Zhang, H. M. Heys, and C. Li, which appeared in the Proceedings of IEEE International Conference on Communications (ICC 2010), Cape Town, South Africa, May 2010, and “Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks” by X. Zhang, H. M. Heys, and C. Li, which appeared in the Proceedings of Biennial Symposium on Communications (QBSC 2010), Kingston, Canada, May 2010. ©2010 IEEE.)