The Design of Rijndael
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
Avrora: scalable sensor network simulation with precise timing
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
The energy cost of cryptographic key establishment in wireless sensor networks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy evaluations in wireless sensor networks: a reality check
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Realistic simulation of energy consumption in wireless sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
Hi-index | 0.00 |
The evaluation of the energy-efficiency of applications and protocols is one of the most important issues in Wireless Sensor Networks (WSN). However, this is a time consuming and challenging task. Therefore, a realistic energy-efficiency evaluation is often neglected or oversimplified by using simple theoretical models or unsuited simulation tools. In this work, we evaluate the energy-efficiency of two specific key exchange protocols, an Elliptic Curve Diffie-Hellman with authentication (ECDH-ECDSA) and a Kerberos based approach, while using different duty-cycling MAC layer protocols. In our evaluation, we compare the results from a theoretical model with simulation results using the AVRORA+ simulation tool and real-world measurements in our WSN testbed SANDbed. Using three MAC layer protocols, TinyOS built in Low-Power-Listening as well as S-MAC and standard 802.15.4, we show that there are several important cross-layer effects that should be considered when performing an energy-efficiency evaluation. Furthermore, we argue, that there are several evaluation metrics like the absolute energy consumption per key exchange or one key exchange per measured time interval.