Performance Analysis of AES Implementation on a Wireless Sensor Network

  • Chetan Rajan Dongarsane
  • D. Maheshkumar
  • S. V. Sankpal
Conference paper


For Wireless Sensor Network (WSN) there is a strong requirement for the security as well as the confidentiality of sensing data. Any protocol design for WSNs needs to consider the limitations of sensor nodes carefully. Nowadays the Advanced Encryption Standard (AES) has attracted attention of researchers for WSN applications. AES is a symmetric cipher, with less practical vulnerabilities provide sufficient levels of security for the confidentiality of the data in WSN. This paper evaluates AES performance on a wireless sensor node with the consideration of energy consumption.


WSN AES Cipher Encryption Confidentiality 


  1. 1.
    Chang-Doo Lee, Bong-Jun Choi, Kyoo-Seok Park (2004) Design and evaluation of a block encryption algorithm using dynamic-key mechanism. Futur Gener Comput Syst 20(2):327–338CrossRefGoogle Scholar
  2. 2.
    Li L, Halpern JY, Bahl P, Wang YM, Wattenhofer R. A cone-based distributed topologyGoogle Scholar
  3. 3.
    Coppersmith D (1994) The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Dev 38:243–250CrossRefGoogle Scholar
  4. 4.
    Kwok-Wo Wong, Sun-Wah Ho, Ching-KiYung (2003) A chaotic cryptography scheme forgenerating short ciphertext. Phys Lett A 310(1):67–73MathSciNetCrossRefGoogle Scholar
  5. 5.
    Borms J, Steenhaut K, Phung KH, Lemmens B (2010) Atraffic-adaptive multi-channel MAC protocol for wirelesssensor networks. In: Proceedings of the international conference on communications and electronics, 2010, 11–13 August, NhaTrang, VietnamGoogle Scholar
  6. 6.
    Bertoni G, Breveglieri L, Fragneto P, Macchetti M, Marchesin S (2003) Efficient software implementation of AES on 32-bit platforms. Lect Notes Comput Sci 2523:129–142CrossRefGoogle Scholar
  7. 7.
    Chipcon (2004) CC2420 datasheet. Chipcon. Available online at:
  8. 8.
    FIP 197 Announcing the advanced encryption standard, Nov 26, 2001.
  9. 9.
    Daemen J, Rijmen V (1999) AES proposal: Rijndael, AES algorithm Submission, September 3Google Scholar
  10. 10.
    Schneier B 1993Description of a new variable-length key, 64-bit block cipher (blowfish). Fast software encryption, Cambridge security workshop proceedings (December 1993), Lecture notes in computer science (LNCS), vol 809, Springer, pp 191–204, ISBN 3-540-58108-1Google Scholar
  11. 11.
    Chou PH, Park C (2005) Energy-efficient platform designsfor real-world wireless sensingapplication. In: Proceedings ofthe International Conference on Computer-Aided Design, November, San Jose, CA, pp 913–920Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Chetan Rajan Dongarsane
    • 1
  • D. Maheshkumar
    • 2
  • S. V. Sankpal
    • 3
  1. 1.Sanjeevan Engineering & Technology Institute PanhalaPanhalaIndia
  2. 2.JSS Academy of Technical EducationBengaluruIndia
  3. 3.D.Y.Patil College of Engineering & TechnologyKolhapurIndia

Personalised recommendations