Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security
نویسندگان
چکیده
With the widespread growth in applications for resourcelimited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography Algorithms for WSNs. In this paper, two potential block ciphers, namely the RC5 and AESRijndael, are analyzed and their suitability for resourcelimited wireless network security are compared based on performance criteria such as computational complexity overhead and energy consumption. Using simulation tests and analytical models, we provide important analysis and considerations on practical feasibility of these cryptographic Algorithms in sensor networks to help designers predict security performance under a set of constraints for WSNs.
منابع مشابه
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security
Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملA Security Framework for Wireless Sensor Networks
Dept. of Computer Engineering, University College of Engineering, Punjabi University, Patiala, Punjab, India [email protected] Dept. of Computer Engineering, University College of Engineering, Punjabi University, Patiala, Punjab, India [email protected] Abstract: Advancements in the technologies of micro electromechanical and embedded chips make it possible to design a tiny device with m...
متن کاملPerformance analysis of deterministic key allocation schemes for wireless sensor networks
Because of the resource-constrained nature of Wireless Sensor Networks (WSNs), it is easier to use a security system based on symmetric key cryptography. However, the distribution and management of cryptographic keys pose challenges of their own. In this paper, we study some deterministic methods of distribution of keys to nodes. We propose and analyze a polynomial-based scheme and a complete c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 9 شماره
صفحات -
تاریخ انتشار 2009