Performance evaluation of scalable encryption algorithm for wireless sensor networks

被引:0
作者
Cakiroglu, Murat [1 ]
Bayilmis, Cueneyt [1 ]
Ozcerit, Ahmet Turan [1 ]
Cetin, Ozdemir [1 ]
机构
[1] Univ Sakarya, Fac Technol, Dept Comp Engn, Adapazari, Turkey
来源
SCIENTIFIC RESEARCH AND ESSAYS | 2010年 / 5卷 / 09期
关键词
Wireless sensor network (WSN); block cipher; data security; SEA; AES; RC6;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limited supplies of WSNs and the hazardous nature of wireless medium. The implementation of encryption/decryption algorithms, which are the most essential part of the secure communication, can be very intricate in WSNs since, they incorporate routines, having very complex and intense computing procedures. Therefore, WSNs must be designed in such a way that a compromise should be established by balancing between the security level and the processor overhead. The aim of this paper is to investigate the suitability of the Scalable Encryption Algorithm (SEA) in use for a secure communication in WSNs. In order to confirm the effectiveness of SEA, a comparative performance evaluation with AES and RC6 algorithms are presented in terms of memory requirement, execution time, and bandwidth criteria. According to the results obtained from the target development platform, SEA has better performance than AES in respect of memory requirements and bandwidth, on the other hand, it has surpassed RC6 algorithm in terms of execution time and total memory requirement. As a result, SEA can be a strong alternative block cipher for WSNs.
引用
收藏
页码:856 / 861
页数:6
相关论文
共 18 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
*ATM CORP, AVR STUD 4 18
[3]  
*AVR GCC, 2010, FREE AVR C COMPL
[4]  
Bando M., 2009, IEEE HPSR, P1, DOI DOI 10.1109/HPSR.2009.5307429
[5]  
BAYIMIS C, 2008, P 3 INT INF SEC CRYP
[6]  
BIRYUKOV A, 2009, ASIACRYPT, V59, P1
[7]  
Daemen J., 2002, DESIGN RIJNDAEL ADV
[8]  
Deng J., 2002, CS93902 CU DEP COMP
[9]  
GUIMARAES G, 2005, EVALUATION SECURITY, P428
[10]  
Hinoue T., 2007, IPSJ J, V48, P1