• DocumentCode
    2135687
  • Title

    Evaluation of security mechanisms in wireless sensor networks

  • Author

    Guimarães, Germano ; Souto, Eduardo ; Sadok, Djamel ; Kelner, Judith

  • fYear
    2005
  • fDate
    14-17 Aug. 2005
  • Firstpage
    428
  • Lastpage
    433
  • Abstract
    Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanism on sensor nodes and the network as a whole. Hence a number of actual measurements were undertaken in a real sensor platform in order to accurately establish energy consumption for various encryption algorithms; as well the baseline scenario obtained when none of these is used. Measurements have shown that integrity code length added to application messages using some cryptography algorithms and MAC (message authentication code) is acceptable for a sensor node with 128 kB of ROM memory and 4 kB of RAM (MICA2). We also were able to check that power consumption of the encryption process does not in itself cause representative impact, since it is in the micro-joules range.
  • Keywords
    cryptography; message authentication; telecommunication security; wireless sensor networks; 128 kB; 4 kB; ad hoc networks; encryption algorithms; energy consumption; integrity code length; message authentication code; power consumption; security mechanisms; wireless sensor networks; Cryptography; Energy consumption; Energy measurement; Hardware; Length measurement; Message authentication; Random access memory; Read only memory; Read-write memory; Wireless sensor networks; Cryptography Algorithm; Power Consumption; Security System; Wireless Sensor Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systems Communications, 2005. Proceedings
  • Print_ISBN
    0-7695-2422-2
  • Type

    conf

  • DOI
    10.1109/ICW.2005.47
  • Filename
    1515560