Abstract
Due to the sensitive and often personal nature of sensor data that many wireless sensor networks collect, the security of this data must be guaranteed. This is fast becoming an important concern for sensor networks which are finding applications in the military and home health domains. The best and often the only way to secure this data is to encrypt it using a secure encryption algorithm before it is transmitted over the air ways. Due to the constrained nature of the resources, memory and clock speeds, available on sensor nodes however, the cost, both in terms of power consumption and speed of encryption, of a software based encryption procedure can often outweigh the risks of the transmission being intercepted. This paper presents a solution to reduce this cost of employing encryption by taking advantage of a resource already available on many sensor nodes, including the Crossbow MICAz and MoteIV’s TmoteSKY; this resource being the AES encryption module available on the Chipcon CC2420 transceiver chip. The performance of using this method of securing data on a sensor network against using software implementations of some of the most popular cipher algorithms suitable for WSN is then analysed for both hardware platforms.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Á. Lédeczi, A. Nádas, P. Völgyesi, G. Balogh, B. Kusy, J. Sallai, G. Pap, S. Dóra, K. Molnár, M. Maróti, and G. Simon (2005) Counter sniper System for Urban Warfare. In ACM Transactions on Sensor Networks (TOSN), vol. 1, pp. 157–177.
C.-L. Fok, G.-C. Roman, and C Lu (2005) Mobile Agent Middleware for Sensor Networks: An Application Case Study. In Proc. 4th International Conference on Information Processing in Sensor Networks (IPSN’05), Los Angeles, California.
T. Schmid, H. Dubois-Ferrière, and M. Vetterli (2005) SensorScope: Experiences with a Wireless Building Monitoring Sensor Network. In Proc. Workshop on Real-World Wireless Sensor Networks (REALWSN’05), Stockholm, Sweden.
R. Want, A. Hopper, V. Falcão, and J. Gibbons (1992) The Active Badge Location System. In ACM Transactions on Information Systems (TOIS), vol. 10, pp. 91–102.
802.15.4: Wireless Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). (2003) New York: IEEE Standards Association.
R. Rivest (1994) The RC5 Encryption Algorithm. In Proc. 1994 Leuven Workshop on Fast Software Encryption, Leuven, Belgium.
NIST (1998) Skipjack and KEA Algorithm Specifications Version 2.0. NIST.
C. Karlof, N. Sastry, and D. Wagner (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.
A. Vitaletti and G. Palombizio (2006) Rijndael for Sensor Networks: Is Speed the Main Issue?. In Proc. 2nd Workshop on Cryptography for Ah Hoc Networks, Venice, Italy.
Y.W. Law, J. Doumen, and P. Hartel (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. In ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 65–93.
J Daemen and V. Rijmen (1999) AES Proposal: Rigndael.
M. Matsui (1997) New Block Encryption Algorithm MISTY. In Proc. 4th International Workshop on Fast Software Encryption, Haifa, Israel.
Chipcon (2004) CC2420 Datasheet [online], available: http://www.chipcon.com/files/ CC2420_Data_Sheet_1_3.pdf [accessed 9 Feb 2007].
M. Healy, T. Newe and E. Lewis (2007) Resource Implications for Data Security in Wireless Sensor Network nodes. In Proc. International Conference on Sensor Technologies and Applications, Valencia, Spain.
S. Roundy, P.K. Wright, and J.M. Rabaey (2003) Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations, 1st ed: Springer.
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K.S.J. Pister (2000) System Architecture Directions for Networked Sensors. In Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, Massachusetts, USA.
M. Healy, T. Newe, and E. Lewis (2007) Power Management in Operating Systems for Wireless Sensor Nodes. In Proc. IEEE Sensors Applications Symposium (SAS 2007), San Diego, California, USA.
K. Sun, P. Ning, and C. Wang (2006) TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks. In Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.
A. Biryukov, E. Kushilevitz (1998) Improved Cryptanalysis of RC5. In Proc. Advances in Cryptology—EUROCRYPT ’98, International Conference on the Theory and Application of Cryptographic Techniques. LNCS, Springer-Verlag, vol. 1403, pp. 85–99.
M. Healy, T. Newe, and E. Lewis (2007) Securing Sensor Data on a Wireless Sensor Network. In Proc. 2nd International Conference on Sensing Technology, Palmerston North, New Zealand. pp. 176–181, ISBN 978-0-473-12432-8.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Healy, M., Newe, T., Lewis, E. (2008). Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds) Smart Sensors and Sensing Technology. Lecture Notes Electrical Engineering, vol 20. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79590-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-79590-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79589-6
Online ISBN: 978-3-540-79590-2
eBook Packages: EngineeringEngineering (R0)