TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Denial-of-service resilience password-based group key agreement for wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
CORA: Correlation-based resilient aggregation in sensor networks
Ad Hoc Networks
On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycle
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Cost of secure sensing in IEEE 802.15.4 networks
IEEE Transactions on Wireless Communications
Lightweight broadcast authentication protocols reconsidered
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
SM-Sens: security middleware for wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
RC5-based security in wireless sensor networks: utilization and performance
WSEAS Transactions on Computers
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security and performance trade-off in KILAVI wireless sensor network
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Managed Ecosystems of Networked Objects
Wireless Personal Communications: An International Journal
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Information Sciences: an International Journal
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Information-theoretic modeling of false data filtering schemes in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Body area network for first responders: a case study
Proceedings of the Fifth International Conference on Body Area Networks
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Reconfiguring the software radio to improve power, price, and portability
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks
International Journal of Adaptive, Resilient and Autonomic Systems
Lightweight energy consumption based intrusion detection system for wireless sensor networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
A k-anonymity privacy-preserving approach in wireless medical monitoring environments
Personal and Ubiquitous Computing
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
Future Generation Computer Systems
Hi-index | 0.00 |
In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks. We investigate four types of nodes; MICA2DOT, MICA2, MICAz and TelosB. For all these nodes we estimate the power consumption for most common RSA and ECC operations, i.e., signature generation and verification as well as key exchange mechanisms. We also estimate the power consumed by the transmission of their results. Our results show that the application of strong cryptography is feasible. Even for the most constrained node performing the ECC-160 signature once every 10 minutes increases the duty cycle only by about 0.5 per cent, i.e., the influence to the lifetime is not significant. Nevertheless, the public key cryptography shall be used with care.