The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of sec...
Saved in:
| Published in: | Computer networks (Amsterdam, Netherlands : 1999) Vol. 54; no. 17; pp. 2967 - 2978 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Kidlington
Elsevier B.V
03.12.2010
Elsevier Elsevier Sequoia S.A |
| Subjects: | |
| ISSN: | 1389-1286, 1872-7069 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources. |
|---|---|
| AbstractList | With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources. With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources. [PUBLICATION ABSTRACT] |
| Author | Kapitanova, Krasimira Lee, Jongdeog Son, Sang H. |
| Author_xml | – sequence: 1 givenname: Jongdeog surname: Lee fullname: Lee, Jongdeog email: jdlee@kma.ac.kr organization: Department of Electronics Engineering and Information Science, Korea Military Academy, Seoul, Republic of Korea – sequence: 2 givenname: Krasimira surname: Kapitanova fullname: Kapitanova, Krasimira email: krasi@cs.virginia.edu organization: Department of Computer Science, University of Virginia, Charlottesville, United States – sequence: 3 givenname: Sang H. surname: Son fullname: Son, Sang H. email: son@cs.virginia.edu organization: Department of Computer Science, University of Virginia, Charlottesville, United States |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=23388204$$DView record in Pascal Francis |
| BookMark | eNqFkU9rGzEQxUVJoYmbb5DDUig5rTuj_SO5h0AwTVII9JKehXZ2lspdS660jsm3r4xNDj4kJ4nhvac3P12IMx88C3GFMEfA9ttqTmHteZpLyCNo5oD4QZyjVrJU0C7O8r3SixKlbj-Ji5RWAFDXUp8LfPrDxSY64iIMRWLaRje9FM4XOxd55JTy0KcQi5y_C_Fv-iw-DnZMfHk8Z-L33Y-n5UP5-Ov-5_L2saS6xalslNTQawkMdadRUts1fdd3SJ2q-k4qNSwIsO6bXK0jYEQeBm2VJYWq52omrg-5mxj-bTlNZu0S8Thaz2GbjK4QdbOAOiu_nChXYRt9LmdUW0GldH5jJr4eRTaRHYdoPblk8uprG1-MrCqdy-7D6oOOYkgp8vAqQTB72mZlDrTNnraBxmTa2fb9xEZuspMLforWje-Zbw5mzjyfHUeTyLEn7vMf0GT64N4O-A8aqp5H |
| CitedBy_id | crossref_primary_10_1002_dac_2621 crossref_primary_10_1109_TIE_2014_2331014 crossref_primary_10_1145_2541228_2555313 crossref_primary_10_1016_j_compeleceng_2018_01_016 crossref_primary_10_1109_ACCESS_2019_2909554 crossref_primary_10_1155_2012_406254 crossref_primary_10_1016_j_ifacol_2018_07_132 crossref_primary_10_1002_wcm_2562 crossref_primary_10_1016_j_compeleceng_2013_03_019 crossref_primary_10_1155_2015_392495 crossref_primary_10_1109_TAC_2024_3463728 crossref_primary_10_1016_j_adhoc_2016_02_019 crossref_primary_10_1016_j_ifacol_2023_10_1028 crossref_primary_10_1109_COMST_2019_2899354 crossref_primary_10_1016_j_automatica_2024_111932 crossref_primary_10_1587_transinf_2015ICP0028 crossref_primary_10_1109_TWC_2013_090413_130072 crossref_primary_10_1109_JBHI_2013_2268897 crossref_primary_10_1016_j_comcom_2014_03_025 crossref_primary_10_3390_info8040136 crossref_primary_10_1109_JIOT_2019_2957396 crossref_primary_10_1109_JIOT_2021_3077866 crossref_primary_10_3390_s18010251 crossref_primary_10_1002_sec_1743 crossref_primary_10_1109_TCOMM_2022_3169813 crossref_primary_10_3390_s140202732 crossref_primary_10_1109_JBHI_2013_2293620 crossref_primary_10_1109_TIFS_2014_2357998 crossref_primary_10_1002_ett_4680 crossref_primary_10_1016_j_tcs_2018_12_002 crossref_primary_10_1109_TSIPN_2025_3603723 crossref_primary_10_1109_JBHI_2012_2235180 crossref_primary_10_1109_JSEN_2015_2475298 crossref_primary_10_1109_TAC_2019_2927459 crossref_primary_10_3390_s19071513 crossref_primary_10_1016_j_compeleceng_2021_107517 crossref_primary_10_1109_ACCESS_2020_3007536 crossref_primary_10_1016_j_jnca_2019_01_028 crossref_primary_10_1109_ACCESS_2020_2985719 crossref_primary_10_1155_2017_2046735 crossref_primary_10_1016_j_sysarc_2021_102296 crossref_primary_10_1016_j_compeleceng_2012_07_010 crossref_primary_10_1080_01611194_2018_1563009 crossref_primary_10_1109_ACCESS_2019_2925787 crossref_primary_10_1016_j_suscom_2015_10_002 crossref_primary_10_1109_TAC_2023_3288624 crossref_primary_10_1007_s11277_014_1773_4 crossref_primary_10_3390_sym13010129 crossref_primary_10_3390_electronics9091418 crossref_primary_10_1002_cpe_3956 crossref_primary_10_1109_TIFS_2016_2647225 crossref_primary_10_1049_iet_wss_2018_5157 |
| Cites_doi | 10.1007/3-540-45537-X_8 10.1145/941370.941372 10.1109/ISCC.2003.1214142 10.1145/1031495.1031515 10.1109/SAHCN.2004.1381904 10.1109/TMC.2006.16 10.1109/IPSN.2008.47 10.1109/PERCOMW.2006.110 10.1007/978-3-540-77024-4_43 10.1145/1138127.1138130 10.1145/1180345.1180366 10.1007/3-540-44598-6_12 10.1109/ICW.2005.47 10.1145/1218556.1218559 10.1007/s00145-005-0129-3 10.1007/978-3-540-89862-7_22 10.1109/ICCCN.2007.4317803 |
| ContentType | Journal Article |
| Copyright | 2010 Elsevier B.V. 2015 INIST-CNRS Copyright Elsevier Sequoia S.A. Dec 3, 2010 |
| Copyright_xml | – notice: 2010 Elsevier B.V. – notice: 2015 INIST-CNRS – notice: Copyright Elsevier Sequoia S.A. Dec 3, 2010 |
| DBID | AAYXX CITATION IQODW 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| DOI | 10.1016/j.comnet.2010.05.011 |
| DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Computer and Information Systems Abstracts Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Applied Sciences |
| EISSN | 1872-7069 |
| EndPage | 2978 |
| ExternalDocumentID | 2183928841 23388204 10_1016_j_comnet_2010_05_011 S138912861000157X |
| Genre | Feature |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABFNM ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 XFK ZMT ZY4 ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABJNI ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD AFXIZ AGCQF AGRNS BNPGV IQODW SSH 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c461t-57280d820e04b812c6b5dbdb1cb73db277f9c014d5138bc0e11eff8a7ac717de3 |
| ISICitedReferencesCount | 128 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000284567000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1389-1286 |
| IngestDate | Sun Sep 28 02:38:04 EDT 2025 Mon Nov 17 16:21:56 EST 2025 Mon Jul 21 09:11:14 EDT 2025 Sat Nov 29 08:16:43 EST 2025 Tue Nov 18 21:22:03 EST 2025 Fri Feb 23 02:21:13 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 17 |
| Keywords | Message authentication code algorithm Wireless sensor network Energy consumption analysis Symmetric-key encryption algorithm Block cipher operation modes Wireless telecommunication Algorithm Remote sensing Military application Private key Block ciphering Security of data Electric power consumption Data transmission network Wireless network Sensor array Message authentication Signal detection |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 CC BY 4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c461t-57280d820e04b812c6b5dbdb1cb73db277f9c014d5138bc0e11eff8a7ac717de3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 763037851 |
| PQPubID | 47119 |
| PageCount | 12 |
| ParticipantIDs | proquest_miscellaneous_831185904 proquest_journals_763037851 pascalfrancis_primary_23388204 crossref_primary_10_1016_j_comnet_2010_05_011 crossref_citationtrail_10_1016_j_comnet_2010_05_011 elsevier_sciencedirect_doi_10_1016_j_comnet_2010_05_011 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-12-03 |
| PublicationDateYYYYMMDD | 2010-12-03 |
| PublicationDate_xml | – month: 12 year: 2010 text: 2010-12-03 day: 03 |
| PublicationDecade | 2010 |
| PublicationPlace | Kidlington |
| PublicationPlace_xml | – name: Kidlington – name: Amsterdam |
| PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
| PublicationYear | 2010 |
| Publisher | Elsevier B.V Elsevier Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier – name: Elsevier Sequoia S.A |
| References | B.S. Kaliski Jr., Y.L. Yin, On the security of the RC5 encryption algorithm, RSA Laboratories, September 2006, TR-602, Version 1.0. Zhu, Setia, Jajodia (bib16) 2006 G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428–433. Law, Doumen, Hartel (bib9) 2006 Bruce Schneier, 2005. Tinyness: An overview of TEA and related ciphers, 2004. Mihir Bellare, Joe Kilian, Phillip Rogaway, Survey and benchmark of block ciphers for wireless sensor networks, in: JCSS 2006, pp. 362–399. Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kokate, Mohamed Younis, A low-energy key management protocol for wireless sensor networks, in: ISCC 2003, pp. 335–340. Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks, in: ICISS 2008, pp. 258–272. Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: SenSys 2004, pp. 162–175. David Malan, Matt Welsh, Michael Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: IEEE SECON 2004, pp. 71–80. Iwata, Kurosawa (bib27) 2003; 2887 Guido Bertoni, Luca Breveglieri, Matteo Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: PERCOMW 2006, pp. 337. John Black, Phillip Rogaway, CBC MACs for arbitrary-length messages: the three-key constructions, Advances in Cryptology, Lecture Notes in Computer Science 2000, pp. 197–215. Biham, Biryukov, Shamir (bib19) 2005; 5 CC2420 Data Sheet, 2007. . Jongdeog Lee, Krasimira Kapitanova, Sang H. Son, Supporting multilevel security in wireless sensor networks, University of Virginia Department of Computer Sciences, October 2008, CS-2008-11. Niels Ferguson, Richard Schroeppel, Doug Whiting, A simple algebraic representation of Rijndael, Selected Areas in Cryptography, LNCS 2001, pp. 103–111. Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM 2005, pp. 324–328. Chih-Chun Chang, Sead Muftic, David J. Nagel, Measurement of energy costs of security in wireless sensor nodes, in: ICCCN 2007, pp. 95–102. David W. Carman, Peter S. Kruus, Brian J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs, The Security Research Division, 2000, number 00-010. Chang, Nagel, Muftic (bib13) 2007 Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: WSNA 2003, pp. 151–159. Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter, How public key cryptography influences wireless sensor node lifetime, SASN 2006, pp. 169–176. RSA Laboratories, 2009. An Liu, Peng Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN 2008, pp. 245–256. Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, in: IEEE TMC 2005, pp. 128–143. Perrig, Szewczyk, Wen, Culler, Tygar (bib15) 2001 10.1016/j.comnet.2010.05.011_bib1 10.1016/j.comnet.2010.05.011_bib28 10.1016/j.comnet.2010.05.011_bib26 10.1016/j.comnet.2010.05.011_bib24 10.1016/j.comnet.2010.05.011_bib25 10.1016/j.comnet.2010.05.011_bib22 10.1016/j.comnet.2010.05.011_bib23 10.1016/j.comnet.2010.05.011_bib20 10.1016/j.comnet.2010.05.011_bib21 10.1016/j.comnet.2010.05.011_bib7 Iwata (10.1016/j.comnet.2010.05.011_bib27) 2003; 2887 10.1016/j.comnet.2010.05.011_bib6 10.1016/j.comnet.2010.05.011_bib8 10.1016/j.comnet.2010.05.011_bib3 10.1016/j.comnet.2010.05.011_bib2 10.1016/j.comnet.2010.05.011_bib5 10.1016/j.comnet.2010.05.011_bib4 Biham (10.1016/j.comnet.2010.05.011_bib19) 2005; 5 Law (10.1016/j.comnet.2010.05.011_bib9) 2006 Perrig (10.1016/j.comnet.2010.05.011_bib15) 2001 10.1016/j.comnet.2010.05.011_bib17 10.1016/j.comnet.2010.05.011_bib18 10.1016/j.comnet.2010.05.011_bib14 10.1016/j.comnet.2010.05.011_bib11 10.1016/j.comnet.2010.05.011_bib12 10.1016/j.comnet.2010.05.011_bib10 Chang (10.1016/j.comnet.2010.05.011_bib13) 2007 Zhu (10.1016/j.comnet.2010.05.011_bib16) 2006 |
| References_xml | – reference: Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: WSNA 2003, pp. 151–159. – reference: RSA Laboratories, 2009. – reference: Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM 2005, pp. 324–328. – start-page: 500 year: 2006 end-page: 528 ident: bib16 article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks publication-title: ACM Transactions on Sensor Networks – reference: CC2420 Data Sheet, 2007. – reference: Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, in: IEEE TMC 2005, pp. 128–143. – reference: G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428–433. – start-page: 469 year: 2007 end-page: 480 ident: bib13 article-title: Balancing security and energy consumption in wireless sensor networks publication-title: Mobile Ad-Hoc and Sensor Networks – reference: Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks, in: ICISS 2008, pp. 258–272. – volume: 5 start-page: 291 year: 2005 end-page: 311 ident: bib19 article-title: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials publication-title: Journal of Cryptology – reference: B.S. Kaliski Jr., Y.L. Yin, On the security of the RC5 encryption algorithm, RSA Laboratories, September 2006, TR-602, Version 1.0. – reference: Jongdeog Lee, Krasimira Kapitanova, Sang H. Son, Supporting multilevel security in wireless sensor networks, University of Virginia Department of Computer Sciences, October 2008, CS-2008-11. – reference: David Malan, Matt Welsh, Michael Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: IEEE SECON 2004, pp. 71–80. – reference: Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kokate, Mohamed Younis, A low-energy key management protocol for wireless sensor networks, in: ISCC 2003, pp. 335–340. – reference: John Black, Phillip Rogaway, CBC MACs for arbitrary-length messages: the three-key constructions, Advances in Cryptology, Lecture Notes in Computer Science 2000, pp. 197–215. – reference: Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter, How public key cryptography influences wireless sensor node lifetime, SASN 2006, pp. 169–176. – reference: Tinyness: An overview of TEA and related ciphers, 2004. – reference: An Liu, Peng Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN 2008, pp. 245–256. – start-page: 189 year: 2001 end-page: 199 ident: bib15 article-title: SPINS: security protocols for sensor networks publication-title: Wireless Networks – reference: Niels Ferguson, Richard Schroeppel, Doug Whiting, A simple algebraic representation of Rijndael, Selected Areas in Cryptography, LNCS 2001, pp. 103–111. – reference: Guido Bertoni, Luca Breveglieri, Matteo Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: PERCOMW 2006, pp. 337. – reference: Chih-Chun Chang, Sead Muftic, David J. Nagel, Measurement of energy costs of security in wireless sensor nodes, in: ICCCN 2007, pp. 95–102. – volume: 2887 start-page: 129 year: 2003 end-page: 153 ident: bib27 article-title: OMAC: one-key CBC MA, fast software encryption publication-title: LNCS – reference: Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: SenSys 2004, pp. 162–175. – reference: Bruce Schneier, 2005. – reference: David W. Carman, Peter S. Kruus, Brian J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs, The Security Research Division, 2000, number 00-010. – start-page: 65 year: 2006 end-page: 93 ident: bib9 article-title: Survey and benchmark of block ciphers for wireless sensor networks publication-title: ACM Transactions on Sensor Networks – reference: . – reference: Mihir Bellare, Joe Kilian, Phillip Rogaway, Survey and benchmark of block ciphers for wireless sensor networks, in: JCSS 2006, pp. 362–399. – ident: 10.1016/j.comnet.2010.05.011_bib25 – ident: 10.1016/j.comnet.2010.05.011_bib23 – ident: 10.1016/j.comnet.2010.05.011_bib6 – ident: 10.1016/j.comnet.2010.05.011_bib18 doi: 10.1007/3-540-45537-X_8 – ident: 10.1016/j.comnet.2010.05.011_bib11 doi: 10.1145/941370.941372 – ident: 10.1016/j.comnet.2010.05.011_bib14 doi: 10.1109/ISCC.2003.1214142 – ident: 10.1016/j.comnet.2010.05.011_bib1 doi: 10.1145/1031495.1031515 – ident: 10.1016/j.comnet.2010.05.011_bib21 – ident: 10.1016/j.comnet.2010.05.011_bib4 doi: 10.1109/SAHCN.2004.1381904 – ident: 10.1016/j.comnet.2010.05.011_bib7 doi: 10.1109/TMC.2006.16 – ident: 10.1016/j.comnet.2010.05.011_bib2 doi: 10.1109/IPSN.2008.47 – ident: 10.1016/j.comnet.2010.05.011_bib3 doi: 10.1109/PERCOMW.2006.110 – start-page: 469 year: 2007 ident: 10.1016/j.comnet.2010.05.011_bib13 article-title: Balancing security and energy consumption in wireless sensor networks publication-title: Mobile Ad-Hoc and Sensor Networks doi: 10.1007/978-3-540-77024-4_43 – volume: 2887 start-page: 129 year: 2003 ident: 10.1016/j.comnet.2010.05.011_bib27 article-title: OMAC: one-key CBC MA, fast software encryption publication-title: LNCS – start-page: 65 year: 2006 ident: 10.1016/j.comnet.2010.05.011_bib9 article-title: Survey and benchmark of block ciphers for wireless sensor networks publication-title: ACM Transactions on Sensor Networks doi: 10.1145/1138127.1138130 – ident: 10.1016/j.comnet.2010.05.011_bib5 doi: 10.1145/1180345.1180366 – ident: 10.1016/j.comnet.2010.05.011_bib24 – start-page: 189 year: 2001 ident: 10.1016/j.comnet.2010.05.011_bib15 article-title: SPINS: security protocols for sensor networks publication-title: Wireless Networks – ident: 10.1016/j.comnet.2010.05.011_bib26 doi: 10.1007/3-540-44598-6_12 – ident: 10.1016/j.comnet.2010.05.011_bib20 – ident: 10.1016/j.comnet.2010.05.011_bib22 – ident: 10.1016/j.comnet.2010.05.011_bib28 – ident: 10.1016/j.comnet.2010.05.011_bib12 doi: 10.1109/ICW.2005.47 – start-page: 500 year: 2006 ident: 10.1016/j.comnet.2010.05.011_bib16 article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks publication-title: ACM Transactions on Sensor Networks doi: 10.1145/1218556.1218559 – volume: 5 start-page: 291 year: 2005 ident: 10.1016/j.comnet.2010.05.011_bib19 article-title: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials publication-title: Journal of Cryptology doi: 10.1007/s00145-005-0129-3 – ident: 10.1016/j.comnet.2010.05.011_bib10 doi: 10.1007/978-3-540-89862-7_22 – ident: 10.1016/j.comnet.2010.05.011_bib8 doi: 10.1109/ICCCN.2007.4317803 – ident: 10.1016/j.comnet.2010.05.011_bib17 |
| SSID | ssj0004428 |
| Score | 2.4031885 |
| Snippet | With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a... |
| SourceID | proquest pascalfrancis crossref elsevier |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 2967 |
| SubjectTerms | Algorithms Applied sciences Block cipher operation modes Blocking Comparative analysis Computer information security Costs Cryptography Data encryption Energy consumption Energy consumption analysis Exact sciences and technology Experiments Message authentication code algorithm Messages Military Miscellaneous Network security Networks Security Sensors Services and terminals of telecommunications Studies Suitability Symmetric-key encryption algorithm Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Telemetry. Remote supervision. Telewarning. Remote control Teleprocessing networks. Isdn Valuation and optimization of characteristics. Simulation Wireless communication Wireless communication systems Wireless networks Wireless sensor network |
| Title | The price of security in wireless sensor networks |
| URI | https://dx.doi.org/10.1016/j.comnet.2010.05.011 https://www.proquest.com/docview/763037851 https://www.proquest.com/docview/831185904 |
| Volume | 54 |
| WOSCitedRecordID | wos000284567000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: AIEXJ dateStart: 19990114 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Jb9NAFB6FlgMIsZSihkI1B27Ikh0v4zlaKIiiKq1EQLmNPIujVKkdxeny83mTeeMEIhQ4cLEiLxn5vW_e5rcQ8kGWLM4UY4EEXyCw4ywCHkoWGB0laSXTWKt1n9kLNhrlkwm_6vXufS3M3ZzVdf7wwBf_ldVwDphtS2f_gd3dn8IJ-A1MhyOwHY5_zfiFbRVk7cAWx9PZsIbtSjy3gq0F17VZfqxdBni7bZ_6IQ_dRWuBFje2m4JG6GwqhDGcwPlWOOFiOMSg_FSbZtrJ8-LqfFyMLn8UTrKU7exmtuxUwrfLkQtP11OslsBABCZ1xJvoGKryLWEKxhDchK2uUdq6ltEeVWxbdnI3mAP18IC72T47Mt6FG64ti4AWmJ1nm69GG53mv-P_puq6BMQBeOZg-ySPyOGApRwk-mFxPpx83ZTUJuuxvN0r-KrLdWrg7sp_smqeLcoW9lrlhqTs6Pu1ETN-SZ6j90ELh5pXpGfqI_ICPRGKcr49Ik-32lS-JhFAiq4hRZuKekjRWU09pKiDFPWoOSbfPw_Hn74EOGojUEkWrYLUTinTQBETJhJsPpXJVEstIyVZrOWAsYor8KZ1ChSRKjRRZKoqL1mpWMS0id-Qg7qpzQmhWQXbPsm4zKRMqqrMIwU-acaVMlybsOyT2JNKKOxDb8ehzIVPOLwWjsDCEliEqQAC90nQPbVwfVj23M88FwTaks5GFACjPU-e_cK0bjmPmT459VwUuO9bAWo6jBm4L31Cu6sgqe3nt7I2zW0r8hic-ZSHydt9K5ySJ5sN9o4crJa35j15rO5Ws3Z5hlD9CaapsXA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+price+of+security+in+wireless+sensor+networks&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=LEE%2C+Jongdeog&rft.au=KAPITANOVA%2C+Krasimira&rft.au=SON%2C+Sang+H&rft.date=2010-12-03&rft.pub=Elsevier&rft.issn=1389-1286&rft.volume=54&rft.issue=17&rft.spage=2967&rft.epage=2978&rft_id=info:doi/10.1016%2Fj.comnet.2010.05.011&rft.externalDBID=n%2Fa&rft.externalDocID=23388204 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |