• DocumentCode
    606558
  • Title

    Evaluating energy-efficiency of hardware-based security mechanisms

  • Author

    Haas, Christian ; Munz, Stephan ; Wilke, Joachim ; Hergenroder, Anton

  • Author_Institution
    Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany
  • fYear
    2013
  • fDate
    18-22 March 2013
  • Firstpage
    560
  • Lastpage
    565
  • Abstract
    Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.
  • Keywords
    access protocols; cryptographic protocols; energy conservation; surveillance; telecommunication security; wireless sensor networks; IRIS sensor nodes; Karlsruhe Institute of Technology; MAC layer protocols; SANDbed testbed; TinyECC; VaultIC420 security module; WSN; critical areas surveillance; cryptographic algorithms; duty-cycling mechanisms; energy measurements; energy-efficiency; hardware accelerated security modules; hardware module; hardware-based security mechanisms; infrastructure surveillance; processing power; resource constraints; software implementations; wireless sensor networks; Cryptography; Energy consumption; Energy measurement; Hardware; Protocols; Software; Energy-Efficiency; Security; Testbed;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4673-5075-4
  • Electronic_ISBN
    978-1-4673-5076-1
  • Type

    conf

  • DOI
    10.1109/PerComW.2013.6529559
  • Filename
    6529559