Proceedings ArticleDOI
Evaluation of security mechanisms in wireless sensor networks
Germano Guimarães,Eduardo Souto,Djamel Sadok,Judith Kelner +3 more
- pp 428-433
Reads0
Chats0
TLDR
A number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used.Abstract:
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.read more
Citations
More filters
Proceedings ArticleDOI
Transient-based identification of wireless sensor nodes
Boris Danev,Srdjan Capkun +1 more
TL;DR: A new technique for transient-based identification of CC2420 wireless sensor nodes is proposed and it is shown that it enables reliable and accurate sensor node recognition with an Equal Error Rate as low as 0.0024 (0.24%).
Journal ArticleDOI
The price of security in wireless sensor networks
TL;DR: Three aspects of WSNs security are studied: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms: memory and energy consumption and insight into the suitability of different security algorithms for use in WSN environments are provided.
Journal ArticleDOI
SIT: A Lightweight Encryption Algorithm for Secure Internet of Things
TL;DR: Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms.
Proceedings Article
Secure data aggregation in wireless sensor network: a survey
TL;DR: The security issues in data aggregation for the WSN will be discussed and a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary to give a better understanding of those schemes and facilitates the evaluation process.
Issues in Wireless Sensor Networks
TL;DR: A cursory look at each and every topic in WSN is provided and the main aim is to introduce a newbie to the field of WSN and make him understand the various topics of interest available for research.
References
More filters
Journal ArticleDOI
Wireless sensor networks: a survey
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Proceedings ArticleDOI
Energy-efficient communication protocol for wireless microsensor networks
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Energy-efficient communication protocols for wireless microsensor networks
TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI
System architecture directions for networked sensors
TL;DR: Key requirements are identified, a small device is developed that is representative of the class, a tiny event-driven operating system is designed, and it is shown that it provides support for efficient modularity and concurrency-intensive operation.
Journal Article
Security for Sensor Networks
TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Related Papers (5)
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more