Skip to main content
Log in

An accurate prediction model for computational overheads of security mechanisms in Wireless Sensor Networks

  • Published:
Journal of Electronics (China)

Abstract

In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(2004)6, 53–57.

    Article  Google Scholar 

  2. E. Shi and A. Perrig. Designing secure sensor networks. IEEE Wireless Communications Magazine, 11(2004)6, 38–43.

    Article  Google Scholar 

  3. A. Perrig, R. Szewczyk, V. Wen, et al. SPINS: security protocols for sensor networks. The 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy, July 16–21, 2001, 189–199.

  4. C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. The 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, Maryland, USA, Nov. 3–5, 2004, 162–175.

  5. M. Passing and F. Dressler. Experimental performance evaluation of cryptographic algorithms on sensor nodes. The 3rd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Vancouver, Canada, Oct. 9–12, 2006, 882–887.

  6. N. Fournel, M. Minier, and S. Ubeda. Survey and benchmark of stream ciphers for wireless sensor networks. The 1st Workshop in Information Security Theory and Practices, Heraklion, Greece, May 8–11, 2007, 202–214.

  7. W. Liu, R. Luo, and H. Yang. Cryptography overhead evaluation and analysis for wireless sensor networks. The International Conference on Communications and Mobile Computing, Kunming, Yunnan, China, Jan. 6–8, 2009, 496–501.

  8. P. Ganesan, R. Venugopalan, P. Peddabachagari, et al. Analyzing and modeling encryption overhead for sensor network nodes. The 2nd International Workshop on Wireless Sensor Networks and Applications, San Diego, CA, USA, Sep 19, 2003, 151–159.

  9. Y. W. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks, 2(2006)1, 65–93.

    Article  Google Scholar 

  10. G. Boato, F. Granelli, and E. Tecchio. A methodology for numerical evaluation of the computational complexity of AES and Camellia. The 9th International Conference on Distributed Multimedia Systems, Miami, Florida, USA, Sep. 24–26, 2003, 628–631.

  11. R. L. Rivest. The RC5 encryption algorithm. The 2nd International Workshop on Fast Software Encryption, Leuven, Belgium, Dec. 14–16, 1994, 86–96.

  12. B. Schneier. Applied Cryptography. 2ed, New York, John Wiley & Sons, 1996, Chs. 9 and 17.

    Google Scholar 

  13. D. Wheeler and R. Needham. TEA, a tiny encryption algorithm. The 2nd International Workshop on Fast Software Encryption, Leuven, Belgium, Dec. 14–16, 1994, 363–366.

  14. Crossbow Inc. MicaZ Data Sheet. http://www.xbow.com. May 2009.

  15. B. L. Titzer, D. K. Lee, and J. Palsberg. Avrora: scalable sensor network simulation with precise timing. The 4th International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, USA, Apr. 25–27, 2005, 477–482.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong Luo.

Additional information

Supported by 863 Project of China (No.2006AA01Z224).

Communication author: Luo Rong, born in 1970, female, Associate Professor.

About this article

Cite this article

Liu, W., Luo, R. & Yang, H. An accurate prediction model for computational overheads of security mechanisms in Wireless Sensor Networks. J. Electron.(China) 26, 699–705 (2009). https://doi.org/10.1007/s11767-009-0052-0

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-009-0052-0

Key words

CLC index

Navigation