Investigation of feasible cryptographic algorithms for wireless sensor network

被引:0
|
作者
Choi, KJ [1 ]
Song, JI [1 ]
机构
[1] GIST, Dept Informat & Commun, Kwangju 500712, South Korea
来源
8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES | 2006年
关键词
wireless sensor network; security; cryptographic algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Feasibility of various cryptographic algorithms for use in a wireless sensor network utilizing MICAz-type motes [1] and the TinyOS [2] is investigated. Usage of resources including memory, computation time, and power for each cryptographic algorithm was characterized experimentally. The RC4 and MD5 turned out to be most suitable algorithms for a wireless sensor network utilizing MICAz-type motes in terms of the total cryptographic processing time used.
引用
收藏
页码:U1379 / U1381
页数:3
相关论文
共 50 条
  • [41] Benchmarking of lightweight cryptographic algorithms for wireless IoT networks
    Soline Blanc
    Abdelkader Lahmadi
    Kévin Le Gouguec
    Marine Minier
    Lama Sleem
    Wireless Networks, 2022, 28 : 3453 - 3476
  • [43] Benchmarking of lightweight cryptographic algorithms for wireless IoT networks
    Blanc, Soline
    Lahmadi, Abdelkader
    Le Gouguec, Kevin
    Minier, Marine
    Sleem, Lama
    WIRELESS NETWORKS, 2022, 28 (8) : 3453 - 3476
  • [44] Optimization and benchmark of cryptographic algorithms on network processors
    Tan, ZX
    Lin, C
    Li, YX
    Jiang, YX
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 2296 - 2301
  • [45] Optimization and benchmark of cryptographic algorithms on network processors
    Tan, ZX
    Lin, C
    Yin, H
    Li, B
    IEEE MICRO, 2004, 24 (05) : 55 - 69
  • [46] Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications
    Wang, WeiZheng
    Deng, Zhuo
    Wang, Jin
    Sangaiah, Arun Kumar
    Cai, Shuo
    Almakhadmeh, Zafer
    Tolba, Amr
    SENSORS, 2019, 19 (20)
  • [47] Experimental performance evaluation of cryptographic algorithms on sensor nodes
    Passing, Martin
    Dressler, Falko
    2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 872 - +
  • [48] Scalable cryptographic key management in wireless sensor networks
    Wadaa, A
    Olariu, S
    Wilson, L
    Eltoweissy, M
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 796 - 802
  • [49] Hybrid Cryptographic Technique For Heterogeneous Wireless Sensor Networks
    Kavitha, R. J.
    Caroline, B. Elizabeth
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1016 - 1020
  • [50] Implementation of a Novel Cryptographic Algorithm in Wireless Sensor Networks
    AnandaKrishna, B.
    Madhuri, N.
    Rao, M. Koteswara
    VijaySekar, B.
    2018 CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION ENGINEERING SYSTEMS (SPACES), 2018, : 149 - 153