SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Proceedings of the Third International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Hardware design experiences in ZebraNet
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Ad Hoc & Sensor Networks: Theory And Applications
Ad Hoc & Sensor Networks: Theory And Applications
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
Role Assignment for Data Aggregation in Wireless Sensor Networks
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Energy evaluation of software implementations of block ciphers under memory constraints
Proceedings of the conference on Design, automation and test in Europe
Castor: Secure Code Updates Using Symmetric Cryptosystems
RTSS '07 Proceedings of the 28th IEEE International Real-Time Systems Symposium
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Proceedings of the 5th conference on Computing frontiers
Wireless sensor network survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
Comparing Block Cipher Modes of Operation on MICAz Sensor Nodes
PDP '09 Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing
Towards a classification of energy aware MAC protocols for wireless sensor networks
Wireless Communications & Mobile Computing
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Survey and benchmark of stream ciphers for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Pseudo-random functions and parallelizable modes of operations of a block cipher
IEEE Transactions on Information Theory
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
A new MAC construction alred and a specific instance ALPHA-MAC
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Two-pass authenticated encryption faster than generic composition
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Comparison of Authenticated-Encryption schemes in Wireless Sensor Networks
LCN '11 Proceedings of the 2011 IEEE 36th Conference on Local Computer Networks
Hi-index | 0.00 |
Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.