Performance evaluation of encryption algorithm for wireless sensor networks

Soufiene Ben Othman, A. Trad, H. Youssef
{"title":"Performance evaluation of encryption algorithm for wireless sensor networks","authors":"Soufiene Ben Othman, A. Trad, H. Youssef","doi":"10.1109/ICITES.2012.6216690","DOIUrl":null,"url":null,"abstract":"With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three encryption algorithms, AES, RC5 and RC6. We have measured and compared their memory and energy consumption on Mica2 sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Technology and e-Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITES.2012.6216690","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 30

Abstract

With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three encryption algorithms, AES, RC5 and RC6. We have measured and compared their memory and energy consumption on Mica2 sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.
无线传感器网络加密算法的性能评价
随着资源有限的无线传感器网络(WSN)应用的广泛增长,对其可靠、高效的安全机制的需求增加了许多,但其实现是一项艰巨的任务。在处理速度、电池电量、带宽和内存等方面的限制限制了现有加密算法在无线传感器网络中的适用性。一些安全机制,如TinySec,已经被引入来解决无线传感器网络的安全需求。然而,安全成本在很大程度上仍然是一个未知变量。为了更好地理解这个代价,我们研究了三种加密算法:AES、RC5和RC6。我们测量并比较了它们在Mica2传感器上的内存和能耗。我们的实验结果提供了对不同安全算法在WSN环境中使用的适用性的深入了解,并且可以被WSN设计人员用来构建其系统的安全架构,以满足应用需求并合理利用受约束的传感器资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信