Skip to main content

Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes

  • Chapter
Smart Sensors and Sensing Technology

Part of the book series: Lecture Notes Electrical Engineering ((LNEE,volume 20))

Abstract

Due to the sensitive and often personal nature of sensor data that many wireless sensor networks collect, the security of this data must be guaranteed. This is fast becoming an important concern for sensor networks which are finding applications in the military and home health domains. The best and often the only way to secure this data is to encrypt it using a secure encryption algorithm before it is transmitted over the air ways. Due to the constrained nature of the resources, memory and clock speeds, available on sensor nodes however, the cost, both in terms of power consumption and speed of encryption, of a software based encryption procedure can often outweigh the risks of the transmission being intercepted. This paper presents a solution to reduce this cost of employing encryption by taking advantage of a resource already available on many sensor nodes, including the Crossbow MICAz and MoteIV’s TmoteSKY; this resource being the AES encryption module available on the Chipcon CC2420 transceiver chip. The performance of using this method of securing data on a sensor network against using software implementations of some of the most popular cipher algorithms suitable for WSN is then analysed for both hardware platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Á. Lédeczi, A. Nádas, P. Völgyesi, G. Balogh, B. Kusy, J. Sallai, G. Pap, S. Dóra, K. Molnár, M. Maróti, and G. Simon (2005) Counter sniper System for Urban Warfare. In ACM Transactions on Sensor Networks (TOSN), vol. 1, pp. 157–177.

    Google Scholar 

  2. C.-L. Fok, G.-C. Roman, and C Lu (2005) Mobile Agent Middleware for Sensor Networks: An Application Case Study. In Proc. 4th International Conference on Information Processing in Sensor Networks (IPSN’05), Los Angeles, California.

    Google Scholar 

  3. T. Schmid, H. Dubois-Ferrière, and M. Vetterli (2005) SensorScope: Experiences with a Wireless Building Monitoring Sensor Network. In Proc. Workshop on Real-World Wireless Sensor Networks (REALWSN’05), Stockholm, Sweden.

    Google Scholar 

  4. R. Want, A. Hopper, V. Falcão, and J. Gibbons (1992) The Active Badge Location System. In ACM Transactions on Information Systems (TOIS), vol. 10, pp. 91–102.

    Google Scholar 

  5. 802.15.4: Wireless Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). (2003) New York: IEEE Standards Association.

    Google Scholar 

  6. R. Rivest (1994) The RC5 Encryption Algorithm. In Proc. 1994 Leuven Workshop on Fast Software Encryption, Leuven, Belgium.

    Google Scholar 

  7. NIST (1998) Skipjack and KEA Algorithm Specifications Version 2.0. NIST.

    Google Scholar 

  8. C. Karlof, N. Sastry, and D. Wagner (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proc. 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.

    Google Scholar 

  9. A. Vitaletti and G. Palombizio (2006) Rijndael for Sensor Networks: Is Speed the Main Issue?. In Proc. 2nd Workshop on Cryptography for Ah Hoc Networks, Venice, Italy.

    Google Scholar 

  10. Y.W. Law, J. Doumen, and P. Hartel (2006) Survey and Benchmark of Block Ciphers for Wireless Sensor Networks. In ACM Transactions on Sensor Networks (TOSN), vol. 2, pp. 65–93.

    Article  Google Scholar 

  11. J Daemen and V. Rijmen (1999) AES Proposal: Rigndael.

    Google Scholar 

  12. M. Matsui (1997) New Block Encryption Algorithm MISTY. In Proc. 4th International Workshop on Fast Software Encryption, Haifa, Israel.

    Google Scholar 

  13. Chipcon (2004) CC2420 Datasheet [online], available: http://www.chipcon.com/files/ CC2420_Data_Sheet_1_3.pdf [accessed 9 Feb 2007].

    Google Scholar 

  14. M. Healy, T. Newe and E. Lewis (2007) Resource Implications for Data Security in Wireless Sensor Network nodes. In Proc. International Conference on Sensor Technologies and Applications, Valencia, Spain.

    Google Scholar 

  15. S. Roundy, P.K. Wright, and J.M. Rabaey (2003) Energy Scavenging for Wireless Sensor Networks: With Special Focus on Vibrations, 1st ed: Springer.

    Google Scholar 

  16. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K.S.J. Pister (2000) System Architecture Directions for Networked Sensors. In Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, Massachusetts, USA.

    Google Scholar 

  17. M. Healy, T. Newe, and E. Lewis (2007) Power Management in Operating Systems for Wireless Sensor Nodes. In Proc. IEEE Sensors Applications Symposium (SAS 2007), San Diego, California, USA.

    Google Scholar 

  18. K. Sun, P. Ning, and C. Wang (2006) TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks. In Proc. 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA.

    Google Scholar 

  19. A. Biryukov, E. Kushilevitz (1998) Improved Cryptanalysis of RC5. In Proc. Advances in Cryptology—EUROCRYPT ’98, International Conference on the Theory and Application of Cryptographic Techniques. LNCS, Springer-Verlag, vol. 1403, pp. 85–99.

    Google Scholar 

  20. M. Healy, T. Newe, and E. Lewis (2007) Securing Sensor Data on a Wireless Sensor Network. In Proc. 2nd International Conference on Sensing Technology, Palmerston North, New Zealand. pp. 176–181, ISBN 978-0-473-12432-8.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Healy, M., Newe, T., Lewis, E. (2008). Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes. In: Mukhopadhyay, S.C., Gupta, G.S. (eds) Smart Sensors and Sensing Technology. Lecture Notes Electrical Engineering, vol 20. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79590-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79590-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79589-6

  • Online ISBN: 978-3-540-79590-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics