Study of Two Security Constructs on Throughput for Wireless Sensor Multi-Hop Networks

被引:0
|
作者
Sparrow, R. D. [1 ]
Adekunle, A. A. [1 ]
Berry, R. J. [1 ]
Farnish, R. J. [1 ]
机构
[1] Univ Greenwich, Wolfson Ctr Bulk Solids Handling Technol, Chatham ME4 4TB, Kent, England
来源
2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO) | 2015年
关键词
Networked Control Systems; Wireless Sensor Networks; AEAD constructs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the interconnection of devices becoming more widespread in society (e.g. internet of things), networked devices are used in a range of environments from smart grids to smart buildings. Wireless Sensor Networks (WSN) have commonly been utilised as a method of monitoring a set processes. In control networks WSN have been deployed to perform a variety of tasks (i.e. collate and distribute data from an event to an end device). However, the nature of the wireless broadcast medium enables attackers to conduct active and passive attacks. Cryptography is selected as a countermeasure to overcome these security vulnerabilities; however, a drawback of using cryptography is reduced throughput. This paper investigates the impact of two software authenticated encryption with associated data (AEAD) security constructs on packet throughput of multiple hop WSN, being counter with cipher block chaining and message authentication code (CCM) and TinyAEAD. Experiments were conducted in a simulated environment. A case scenario is also presented in this paper to emphasise the impact in a real world context. Results observed indicate that the security constructs examined in this paper affect the average throughput measurements up to three hops.
引用
收藏
页码:1302 / 1307
页数:6
相关论文
共 50 条
  • [1] Adaptive Multi-hop Routing for Wireless Sensor Networks
    Tanessakulwattana, Sarayoot
    Pornavalai, Chotipat
    Chakraborty, Goutam
    2013 10TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2013, : 105 - 110
  • [2] Channel coding in multi-hop wireless sensor networks
    Kashani, Zeinab Hajjarian
    Shiva, Mohsen
    2006 6TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS PROCEEDINGS, 2006, : 965 - +
  • [3] Throughput vs. Resilience in Multi-hop Wireless Sensor Networks with Periodic Packet Traffic
    Ostrowski, Bartlomiej
    Pioro, Michal
    Tomaszewski, Artur
    Nowak, Mateusz
    Kalesnikau, Ilya
    2020 16TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS DRCN 2020, 2020,
  • [4] Dynamic Multi-hop Routing Protocol in Wireless Sensor Networks
    Li, Xianli
    Zhang, Jiawei
    Liu, Liangbing
    MATERIALS ENGINEERING AND MECHANICAL AUTOMATION, 2014, 442 : 532 - +
  • [5] A multi-hop angular routing protocol for wireless sensor networks
    Akbar, Mariam
    Javaid, Nadeem
    Imran, Muhammad
    Rao, Areeba
    Younis, Muhammad Shahzad
    Niaz, Iftikhar Azim
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (09):
  • [6] A Cognitive Multi-hop Clustering Approach for Wireless Sensor Networks
    I. S. Akila
    R. Venkatesan
    Wireless Personal Communications, 2016, 90 : 729 - 747
  • [7] Multi-hop energy sharing in rechargeable wireless sensor networks
    Zhang, Jianhui
    Wang, Mengmeng
    Shen, Xingfa
    Fan, Jin
    Zhao, Bei
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2016, 20 (04) : 230 - 242
  • [8] BCH coding and multi-hop communication in wireless sensor networks
    Kashani, Zeinab Hajjarian
    Shiva, Mohsen
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 443 - +
  • [9] A Cognitive Multi-hop Clustering Approach for Wireless Sensor Networks
    Akila, I. S.
    Venkatesan, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 729 - 747
  • [10] Channel Allocation for Throughput Enhancement of IEEE 802.11 MAC based Multi-hop Wireless Sensor Networks
    Mini, S. P.
    Rao, S. Viswanatha
    Pillai, Sakuntala S.
    2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 104 - 108