DocumentCode
606558
Title
Evaluating energy-efficiency of hardware-based security mechanisms
Author
Haas, Christian ; Munz, Stephan ; Wilke, Joachim ; Hergenroder, Anton
Author_Institution
Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany
fYear
2013
fDate
18-22 March 2013
Firstpage
560
Lastpage
565
Abstract
Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.
Keywords
access protocols; cryptographic protocols; energy conservation; surveillance; telecommunication security; wireless sensor networks; IRIS sensor nodes; Karlsruhe Institute of Technology; MAC layer protocols; SANDbed testbed; TinyECC; VaultIC420 security module; WSN; critical areas surveillance; cryptographic algorithms; duty-cycling mechanisms; energy measurements; energy-efficiency; hardware accelerated security modules; hardware module; hardware-based security mechanisms; infrastructure surveillance; processing power; resource constraints; software implementations; wireless sensor networks; Cryptography; Energy consumption; Energy measurement; Hardware; Protocols; Software; Energy-Efficiency; Security; Testbed;
fLanguage
English
Publisher
ieee
Conference_Titel
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on
Conference_Location
San Diego, CA
Print_ISBN
978-1-4673-5075-4
Electronic_ISBN
978-1-4673-5076-1
Type
conf
DOI
10.1109/PerComW.2013.6529559
Filename
6529559
Link To Document