Advertisement

Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes

  • Michael Healy
  • Thomas Newe
  • Elfed Lewis
Part of the Lecture Notes Electrical Engineering book series (LNEE, volume 20)

Abstract

Due to the sensitive and often personal nature of sensor data that many wireless sensor networks collect, the security of this data must be guaranteed. This is fast becoming an important concern for sensor networks which are finding applications in the military and home health domains. The best and often the only way to secure this data is to encrypt it using a secure encryption algorithm before it is transmitted over the air ways. Due to the constrained nature of the resources, memory and clock speeds, available on sensor nodes however, the cost, both in terms of power consumption and speed of encryption, of a software based encryption procedure can often outweigh the risks of the transmission being intercepted. This paper presents a solution to reduce this cost of employing encryption by taking advantage of a resource already available on many sensor nodes, including the Crossbow MICAz and MoteIV’s TmoteSKY; this resource being the AES encryption module available on the Chipcon CC2420 transceiver chip. The performance of using this method of securing data on a sensor network against using software implementations of some of the most popular cipher algorithms suitable for WSN is then analysed for both hardware platforms.

Keywords

Sensor data security wireless sensor networks AES CC2420 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Á. Lédeczi, A. Nádas, P. Völgyesi, G. Balogh, B. Kusy, J. Sallai, G. Pap, S. Dóra, K. Molnár, M. Maróti, and G. Simon (2005) Counter sniper System for Urban Warfare. In ACM Transactions on Sensor Networks (TOSN), vol. 1, pp. 157–177.Google Scholar
  2. 2.
    C.-L. Fok, G.-C. Roman, and C Lu (2005) Mobile Agent Middleware for Sensor Networks: An Application Case Study. In Proc. 4th International Conference on Information Processing in Sensor Networks (IPSN’05), Los Angeles, California.Google Scholar
  3. 3.
    T. Schmid, H. Dubois-Ferrière, and M. Vetterli (2005) SensorScope: Experiences with a Wireless Building Monitoring Sensor Network. In Proc. Workshop on Real-World Wireless Sensor Networks (REALWSN’05), Stockholm, Sweden.Google Scholar
  4. 4.
    R. Want, A. Hopper, V. Falcão, and J. Gibbons (1992) The Active Badge Location System. In ACM Transactions on Information Systems (TOIS), vol. 10, pp. 91–102.Google Scholar
  5. 5.
    802.15.4: Wireless Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). (2003) New York: IEEE Standards Association.Google Scholar
  6. 6.
    R. Rivest (1994) The RC5 Encryption Algorithm. In Proc. 1994 Leuven Workshop on Fast Software Encryption, Leuven, Belgium.Google Scholar
  7. 7.
    NIST (1998) Skipjack and KEA Algorithm Specifications Version 2.0. NIST.Google Scholar
  8. 8.
    C. Karlof, N. Sastry, and D. Wagner (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.Google Scholar
  9. 9.
    A. Vitaletti and G. Palombizio (2006) Rijndael for Sensor Networks: Is Speed the Main Issue?. In Proc. 2nd Workshop on Cryptography for Ah Hoc Networks, Venice, Italy.Google Scholar
  10. 10.
    Y.W. Law, J. Doumen, and P. Hartel (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. In ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 65–93.CrossRefGoogle Scholar
  11. 11.
    J Daemen and V. Rijmen (1999) AES Proposal: Rigndael.Google Scholar
  12. 12.
    M. Matsui (1997) New Block Encryption Algorithm MISTY. In Proc. 4th International Workshop on Fast Software Encryption, Haifa, Israel.Google Scholar
  13. 13.
    Chipcon (2004) CC2420 Datasheet [online], available: http://www.chipcon.com/files/ CC2420_Data_Sheet_1_3.pdf [accessed 9 Feb 2007].Google Scholar
  14. 14.
    M. Healy, T. Newe and E. Lewis (2007) Resource Implications for Data Security in Wireless Sensor Network nodes. In Proc. International Conference on Sensor Technologies and Applications, Valencia, Spain.Google Scholar
  15. 15.
    S. Roundy, P.K. Wright, and J.M. Rabaey (2003) Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations, 1st ed: Springer.Google Scholar
  16. 16.
    J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K.S.J. Pister (2000) System Architecture Directions for Networked Sensors. In Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, Massachusetts, USA.Google Scholar
  17. 17.
    M. Healy, T. Newe, and E. Lewis (2007) Power Management in Operating Systems for Wireless Sensor Nodes. In Proc. IEEE Sensors Applications Symposium (SAS 2007), San Diego, California, USA.Google Scholar
  18. 18.
    K. Sun, P. Ning, and C. Wang (2006) TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks. In Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.Google Scholar
  19. 19.
    A. Biryukov, E. Kushilevitz (1998) Improved Cryptanalysis of RC5. In Proc. Advances in Cryptology—EUROCRYPT ’98, International Conference on the Theory and Application of Cryptographic Techniques. LNCS, Springer-Verlag, vol. 1403, pp. 85–99.Google Scholar
  20. 20.
    M. Healy, T. Newe, and E. Lewis (2007) Securing Sensor Data on a Wireless Sensor Network. In Proc. 2nd International Conference on Sensing Technology, Palmerston North, New Zealand. pp. 176–181, ISBN 978-0-473-12432-8.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Michael Healy
    • 1
  • Thomas Newe
    • 1
  • Elfed Lewis
    • 1
  1. 1.Optical Fibre Sensors Research Centre Department of Electronic and Computer EngineeringUniversity of LimerickLimerickIreland

Personalised recommendations