SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Architectural support for fast symmetric-key cryptography
ACM SIGPLAN Notices
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Implementation of fast RSA key generation on smart cards
Proceedings of the 2002 ACM symposium on Applied computing
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
Reinventing the Travois: Encryption/MAC in 30 ROM Bytes
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Proceedings of the 5th conference on Computing frontiers
Journal of Network and Computer Applications
TIMAR: an efficient key management scheme for ubiquitous health care environments
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EasiSOC: towards cheaper and smaller
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Hi-index | 0.00 |
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in the field. Limitations in processing power, battery life, communication bandwidth and memory constrain the applicability of existing cryptography standards for small embedded devices. A mismatch between wide arithmetic for security (32 bit word operations) and embedded data bus widths (often only 8 or 16 bits) combined with lack of certain operations (e.g., multiply) in the ISA present other challenges.This paper offers two contributions. First, a survey investigating the computational requirements for e a number of common cryptographic algorithms and embedded architectures is presented. The objective of this work is to cover a wide class of commonly used encryption algorithms and to determine the impact of embedded architectures on their performance. This will help designers predict a system's performance for cryptographic tasks. Second, methods to derive the computational overhead of embedded architectures in general for encryption algorithms are developed. This allows one to project computational limitations and determine the threshold of feasible encryption schemes under a set of the constraints for an embedded architecture.Experimental measurements indicate uniform cryptographic cost for each encryption class and each architecture class and negligible impact of caches. RC4 is shown to outperform RC5 for the Atmega platform. But when message authentication is required in addition to encryption, hash or block ciphers, such as RC5, have the advantage of providing support for both authentication and encryption. The analytical model allows to assess the impact of arbitrary embedded architectures as a multi-variant function for each encryption scheme. Overall, our results are not only valuable to assess the feasibility of encryption schemes for existing embedded architectures, they also extend to assess the feasibility of encryption methods for new algorithms and architectures for sensor systems.