DocumentCode :
606558
Title :
Evaluating energy-efficiency of hardware-based security mechanisms
Author :
Haas, Christian ; Munz, Stephan ; Wilke, Joachim ; Hergenroder, Anton
Author_Institution :
Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany
fYear :
2013
fDate :
18-22 March 2013
Firstpage :
560
Lastpage :
565
Abstract :
Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.
Keywords :
access protocols; cryptographic protocols; energy conservation; surveillance; telecommunication security; wireless sensor networks; IRIS sensor nodes; Karlsruhe Institute of Technology; MAC layer protocols; SANDbed testbed; TinyECC; VaultIC420 security module; WSN; critical areas surveillance; cryptographic algorithms; duty-cycling mechanisms; energy measurements; energy-efficiency; hardware accelerated security modules; hardware module; hardware-based security mechanisms; infrastructure surveillance; processing power; resource constraints; software implementations; wireless sensor networks; Cryptography; Energy consumption; Energy measurement; Hardware; Protocols; Software; Energy-Efficiency; Security; Testbed;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4673-5075-4
Electronic_ISBN :
978-1-4673-5076-1
Type :
conf
DOI :
10.1109/PerComW.2013.6529559
Filename :
6529559
Link To Document :
بازگشت