scispace - formally typeset
Proceedings ArticleDOI

Evaluation of security mechanisms in wireless sensor networks

Reads0
Chats0
TLDR
A number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used.
Abstract
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.

read more

Citations
More filters
Proceedings ArticleDOI

Transient-based identification of wireless sensor nodes

TL;DR: A new technique for transient-based identification of CC2420 wireless sensor nodes is proposed and it is shown that it enables reliable and accurate sensor node recognition with an Equal Error Rate as low as 0.0024 (0.24%).
Journal ArticleDOI

The price of security in wireless sensor networks

TL;DR: Three aspects of WSNs security are studied: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms: memory and energy consumption and insight into the suitability of different security algorithms for use in WSN environments are provided.
Journal ArticleDOI

SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

TL;DR: Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms.
Proceedings Article

Secure data aggregation in wireless sensor network: a survey

TL;DR: The security issues in data aggregation for the WSN will be discussed and a conceptual framework will be proposed to provide new designs with the minimum security requirements against certain type of adversary to give a better understanding of those schemes and facilitates the evaluation process.

Issues in Wireless Sensor Networks

TL;DR: A cursory look at each and every topic in WSN is provided and the main aim is to introduce a newbie to the field of WSN and make him understand the various topics of interest available for research.
References
More filters
Journal ArticleDOI

Wireless sensor networks: a survey

TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.
Proceedings ArticleDOI

Energy-efficient communication protocol for wireless microsensor networks

TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.

Energy-efficient communication protocols for wireless microsensor networks

TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI

System architecture directions for networked sensors

TL;DR: Key requirements are identified, a small device is developed that is representative of the class, a tiny event-driven operating system is designed, and it is shown that it provides support for efficient modularity and concurrency-intensive operation.
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Related Papers (5)