Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks

09/18/2018
by   Kaushal Shah, et al.
0

The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic level of city streets, goods warehouse monitoring. The security of data is a critical issue for all such applications and as the devices used for the monitoring purpose have several resource constraints (bandwidth, storage capacity, battery life); it is significant to have a lightweight security solution. Therefore, we consider symmetric key based solutions proposed in the literature as asymmetric based solutions require more computation, energy and storage of keys. We analyse the symmetric ciphers with respect to the performance parameters: RAM, ROM consumption and number of CPU cycles. We perform this simulation analysis in Contiki Cooja by considering an example scenario on two different motes namely: Sky and Z1. The aim of this analysis is to come up with the best suited symmetric key based cipher for the linear and grid based WSN.

READ FULL TEXT

page 9

page 10

page 17

research
07/03/2023

Cryptography and Key Management Schemes for Wireless Sensor Networks

Wireless sensor networks (WSNs) are made up of a large number of tiny se...
research
05/27/2020

Secure and Energy Efficient Remote Monitoring Technique (SERMT) for Smart Grid

Monitoring and automation of the critical infrastructures like the power...
research
10/19/2019

Smart Monitoring: remote-monitoring technology of power, gas, and water consumption in Smart Cities

This paper describes the remote-collection technology of detailed data (...
research
04/15/2019

POSTER: IMD Security vs. Energy: Are we tilting at windmills?

Implantable Medical Devices (IMDs) such as pacemakers and neurostimulato...
research
04/15/2019

IMD Security vs. Energy: Are We Tilting at Windmills?: POSTER

Implantable Medical Devices (IMDs) such as pacemakers and neurostimulato...
research
11/19/2019

Protecting RESTful IoT Devices from Battery Exhaustion DoS Attacks

Many IoT use cases involve constrained battery-powered devices offering ...
research
12/22/2021

Supporting RISC-V Performance Counters through Performance analysis tools for Linux (Perf)

Increased attention to RISC-V in Cloud, Data Center, Automotive and Netw...

Please sign up or login with your details

Forgot password? Click here to reset