Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
A recurrent decentralized key management architecture for wireless sensor network
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing
Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Software-based remote code attestation in wireless sensor network
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A taxonomy of secure data aggregation in wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Secure data management in reactive sensor networks
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Mobile node authentication using key distribution scheme in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Performance analysis of multivariate cryptosystem schemes for wireless sensor network
Computers and Electrical Engineering
Hi-index | 0.00 |
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanisms on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (Message Authentication Code) is acceptable for a sensor node with 128 KB of ROM memory and 4 KB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.