On Energy Efficiency of Elliptic Curve Cryptography for Wireless Sensor Networks
نویسندگان
چکیده
Energy efficiency is a primary concern in Wireless Sensor Networks (WSN). This is due to the fact that WSNs are powered battery, and hence the life of WSNs becomes limited by the battery life. Efforts to replace depleted batteries are not feasible if WSNs are often deployed with thousands of sensor nodes, possibly in inaccessible, hostile, hazardous, or remote territories. Though WSNs are energy-constrained, adequate level of security is often desired in many applications of WSNs that guarantees data integrity and confidentiality. However, security protocols introduce extra energy overhead to a sensor node due to additional processing and communications associated with the protocols. Thus it is important to seek security protocols and solutions for WSNs that are energyefficient but also effective. Security is commonly implemented through symmetric key cryptography which requires a key exchange mechanism to establish a key between the communicating parties. One well known key exchange protocol that has been found to be suitable for WSNs is the Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. In this work, we determine energy requirements of ECDH for various key sizes in order to aid the selection of a security level for the key exchange protocol while maintaining the best possible energy efficiency for WSNs. Particularly, we study energy requirements of TinyECC software package for the ECDH key exchange protocol used in Imote2 sensor nodes for key sizes of 128 bits, 160 bits, and 192 bits as recommended by NIST (National Institute of Standards and Technology). Our study shows very favorable results for the 160-bit key ECDH exchange algorithm.
منابع مشابه
Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks
In Wireless Sensor Networks (WSNs), providing a robust security mechanism with limited energy resources is very challenging because of sensor node’s limited resources (computation, bandwidth, memory). Asymmetric-key can fulfill the requirement, but if the number of nodes is large, symmetric-key cryptography is the best natural method because of its scalability. Asymmetric-key cryptography is po...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملEnergy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm
Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...
متن کاملAn Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks
Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required commu...
متن کاملSecurity Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first prop...
متن کامل