Survey Survey and comparison of message authentication solutions on wireless sensor networks

  • Authors:
  • Marcos A. Simplicio, Jr;Bruno T. De Oliveira;Cintia B. Margi;Paulo S. L. M. Barreto;Tereza C. M. B. Carvalho;Mats NäSlund

  • Affiliations:
  • Escola Politécnica - University of São Paulo, São Paulo, Brazil;Escola Politécnica - University of São Paulo, São Paulo, Brazil;Escola Politécnica - University of São Paulo, São Paulo, Brazil;Escola Politécnica - University of São Paulo, São Paulo, Brazil;Escola Politécnica - University of São Paulo, São Paulo, Brazil;Ericsson Research, Stockholm, Sweden

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.