DocumentCode :
587415
Title :
Evaluation of different cryptographic algorithms on wireless sensor network nodes
Author :
Mansour, Ismail ; Chalhoub, Gerard
Author_Institution :
LIMOS, Clermont Univ., Clermont, France
fYear :
2012
fDate :
28-30 Aug. 2012
Firstpage :
1
Lastpage :
6
Abstract :
Security aspects in wireless sensor networks is getting more and more attention in the recent years. Wireless sensor networks are being considered for critical applications where the security issues are a priority. The limited capacities of wireless sensor nodes and the complex algorithms of the security protocols make the subject challenging. Security algorithms are divided into two main families: symmetric and asymmetric algorithms. In this paper we evaluate different symmetric and asymmetric security algorithms in terms of time and energy consumption on one hand and memory usage on another hand.
Keywords :
cryptography; protocols; telecommunication security; wireless sensor networks; asymmetric security algorithm; cryptographic algorithm evaluation; energy consumption; memory usage; security protocol; wireless sensor network node; Chaos; Computers; Elliptic curve cryptography; Read only memory; cryptography; security; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications in Unusual and Confined Areas (ICWCUCA), 2012 International Conference on
Conference_Location :
Clermont Ferrand
Print_ISBN :
978-1-4673-1290-5
Electronic_ISBN :
978-1-4673-1289-9
Type :
conf
DOI :
10.1109/ICWCUCA.2012.6402500
Filename :
6402500
Link To Document :
بازگشت