On the energy cost of communication and cryptography in wireless sensor networks

G De Meulenaer, F Gosset… - … on Wireless and …, 2008 - ieeexplore.ieee.org
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we
investigate the energy cost of cryptographic protocols, both from a communication and a …

The energy cost of cryptographic key establishment in wireless sensor networks

J Großschädl, A Szekely, S Tillich - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Wireless sensor nodes generally face serious limitations in terms of computational power,
energy supply, and network bandwidth. Therefore, the implementation of effective and …

Energy analysis of public-key cryptography for wireless sensor networks

AS Wander, N Gura, H Eberle, V Gupta… - Third IEEE …, 2005 - ieeexplore.ieee.org
In this paper, we quantify the energy cost of authentication and key exchange based on
public-key cryptography on an 8-bit microcontroller platform. We present a comparison of …

A low-energy key management protocol for wireless sensor networks

G Jolly, MC Kusçu, P Kokate… - Proceedings of the Eighth …, 2003 - ieeexplore.ieee.org
Wireless sensor networks have a wide spectrum of civil and military applications that call for
security, eg, target surveillance in hostile environments. Typical sensors possess limited …

On the application of pairing based cryptography to wireless sensor networks

P Szczechowiak, A Kargl, M Scott… - Proceedings of the second …, 2009 - dl.acm.org
Recent research results have shown that Elliptic Curve Cryptography (ECC) is feasible on
resource constrained sensor nodes. In this work we demonstrate that the related but more …

Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks

WK Koo, H Lee, YH Kim, DH Lee - … International Conference on …, 2008 - ieeexplore.ieee.org
Sensor devices have critical resource constraints such as processing speed, memory size
and energy supply. Especially, energy consumption affects the network lifetime so that …

Considerations on security in zigbee networks

G Dini, M Tiloca - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
ZigBee outlines a new suite of protocols targeted at low-rate, low-power devices and sensor
nodes. ZigBee Specification includes a number of security provisions and options. The …

How public key cryptography influences wireless sensor node lifetime

K Piotrowski, P Langendoerfer, S Peter - … of the fourth ACM workshop on …, 2006 - dl.acm.org
In this paper we try to estimate the real influence of public key cryptography (PKC) to the
lifetime of a sensor node in wireless sensor networks. We investigate four types of nodes; …

An efficient scheme for authenticating public keys in sensor networks

W Du, R Wang, P Ning - Proceedings of the 6th ACM international …, 2005 - dl.acm.org
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be
widely used in wireless sensor networks. Recently, it has been shown that the performance …

State of the art in ultra-low power public key cryptography for wireless sensor networks

G Gaubatz, JP Kaps, E Ozturk… - Third IEEE International …, 2005 - ieeexplore.ieee.org
Security in wireless sensor networks is currently provided exclusively through symmetric key
cryptography. In this paper we show that special purpose ultra-low power hardware …