The price of security in wireless sensor networks

With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of sec...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Vol. 54; no. 17; pp. 2967 - 2978
Main Authors: Lee, Jongdeog, Kapitanova, Krasimira, Son, Sang H.
Format: Journal Article
Language:English
Published: Kidlington Elsevier B.V 03.12.2010
Elsevier
Elsevier Sequoia S.A
Subjects:
ISSN:1389-1286, 1872-7069
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.
AbstractList With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources.
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Several security mechanisms, such as TinySec, have been introduced to address the need for security in WSNs. The cost of security, however, still mostly remains an unknown variable. To provide a better understanding of this cost we have studied three aspects of WSNs security: encryption algorithms, modes of operation for block ciphers, and message authentication algorithms. We have measured and compared their memory and energy consumption on both MicaZ and TelosB sensor motes. The results of our experiments provide insight into the suitability of different security algorithms for use in WSN environments and could be used by WSN designers to construct the security architecture of their systems in a way that both satisfies the requirements of the application and reasonably uses the constrained sensor resources. [PUBLICATION ABSTRACT]
Author Kapitanova, Krasimira
Lee, Jongdeog
Son, Sang H.
Author_xml – sequence: 1
  givenname: Jongdeog
  surname: Lee
  fullname: Lee, Jongdeog
  email: jdlee@kma.ac.kr
  organization: Department of Electronics Engineering and Information Science, Korea Military Academy, Seoul, Republic of Korea
– sequence: 2
  givenname: Krasimira
  surname: Kapitanova
  fullname: Kapitanova, Krasimira
  email: krasi@cs.virginia.edu
  organization: Department of Computer Science, University of Virginia, Charlottesville, United States
– sequence: 3
  givenname: Sang H.
  surname: Son
  fullname: Son, Sang H.
  email: son@cs.virginia.edu
  organization: Department of Computer Science, University of Virginia, Charlottesville, United States
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=23388204$$DView record in Pascal Francis
BookMark eNqFkU9rGzEQxUVJoYmbb5DDUig5rTuj_SO5h0AwTVII9JKehXZ2lspdS660jsm3r4xNDj4kJ4nhvac3P12IMx88C3GFMEfA9ttqTmHteZpLyCNo5oD4QZyjVrJU0C7O8r3SixKlbj-Ji5RWAFDXUp8LfPrDxSY64iIMRWLaRje9FM4XOxd55JTy0KcQi5y_C_Fv-iw-DnZMfHk8Z-L33Y-n5UP5-Ov-5_L2saS6xalslNTQawkMdadRUts1fdd3SJ2q-k4qNSwIsO6bXK0jYEQeBm2VJYWq52omrg-5mxj-bTlNZu0S8Thaz2GbjK4QdbOAOiu_nChXYRt9LmdUW0GldH5jJr4eRTaRHYdoPblk8uprG1-MrCqdy-7D6oOOYkgp8vAqQTB72mZlDrTNnraBxmTa2fb9xEZuspMLforWje-Zbw5mzjyfHUeTyLEn7vMf0GT64N4O-A8aqp5H
CitedBy_id crossref_primary_10_1002_dac_2621
crossref_primary_10_1109_TIE_2014_2331014
crossref_primary_10_1145_2541228_2555313
crossref_primary_10_1016_j_compeleceng_2018_01_016
crossref_primary_10_1109_ACCESS_2019_2909554
crossref_primary_10_1155_2012_406254
crossref_primary_10_1016_j_ifacol_2018_07_132
crossref_primary_10_1002_wcm_2562
crossref_primary_10_1016_j_compeleceng_2013_03_019
crossref_primary_10_1155_2015_392495
crossref_primary_10_1109_TAC_2024_3463728
crossref_primary_10_1016_j_adhoc_2016_02_019
crossref_primary_10_1016_j_ifacol_2023_10_1028
crossref_primary_10_1109_COMST_2019_2899354
crossref_primary_10_1016_j_automatica_2024_111932
crossref_primary_10_1587_transinf_2015ICP0028
crossref_primary_10_1109_TWC_2013_090413_130072
crossref_primary_10_1109_JBHI_2013_2268897
crossref_primary_10_1016_j_comcom_2014_03_025
crossref_primary_10_3390_info8040136
crossref_primary_10_1109_JIOT_2019_2957396
crossref_primary_10_1109_JIOT_2021_3077866
crossref_primary_10_3390_s18010251
crossref_primary_10_1002_sec_1743
crossref_primary_10_1109_TCOMM_2022_3169813
crossref_primary_10_3390_s140202732
crossref_primary_10_1109_JBHI_2013_2293620
crossref_primary_10_1109_TIFS_2014_2357998
crossref_primary_10_1002_ett_4680
crossref_primary_10_1016_j_tcs_2018_12_002
crossref_primary_10_1109_TSIPN_2025_3603723
crossref_primary_10_1109_JBHI_2012_2235180
crossref_primary_10_1109_JSEN_2015_2475298
crossref_primary_10_1109_TAC_2019_2927459
crossref_primary_10_3390_s19071513
crossref_primary_10_1016_j_compeleceng_2021_107517
crossref_primary_10_1109_ACCESS_2020_3007536
crossref_primary_10_1016_j_jnca_2019_01_028
crossref_primary_10_1109_ACCESS_2020_2985719
crossref_primary_10_1155_2017_2046735
crossref_primary_10_1016_j_sysarc_2021_102296
crossref_primary_10_1016_j_compeleceng_2012_07_010
crossref_primary_10_1080_01611194_2018_1563009
crossref_primary_10_1109_ACCESS_2019_2925787
crossref_primary_10_1016_j_suscom_2015_10_002
crossref_primary_10_1109_TAC_2023_3288624
crossref_primary_10_1007_s11277_014_1773_4
crossref_primary_10_3390_sym13010129
crossref_primary_10_3390_electronics9091418
crossref_primary_10_1002_cpe_3956
crossref_primary_10_1109_TIFS_2016_2647225
crossref_primary_10_1049_iet_wss_2018_5157
Cites_doi 10.1007/3-540-45537-X_8
10.1145/941370.941372
10.1109/ISCC.2003.1214142
10.1145/1031495.1031515
10.1109/SAHCN.2004.1381904
10.1109/TMC.2006.16
10.1109/IPSN.2008.47
10.1109/PERCOMW.2006.110
10.1007/978-3-540-77024-4_43
10.1145/1138127.1138130
10.1145/1180345.1180366
10.1007/3-540-44598-6_12
10.1109/ICW.2005.47
10.1145/1218556.1218559
10.1007/s00145-005-0129-3
10.1007/978-3-540-89862-7_22
10.1109/ICCCN.2007.4317803
ContentType Journal Article
Copyright 2010 Elsevier B.V.
2015 INIST-CNRS
Copyright Elsevier Sequoia S.A. Dec 3, 2010
Copyright_xml – notice: 2010 Elsevier B.V.
– notice: 2015 INIST-CNRS
– notice: Copyright Elsevier Sequoia S.A. Dec 3, 2010
DBID AAYXX
CITATION
IQODW
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.comnet.2010.05.011
DatabaseName CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1872-7069
EndPage 2978
ExternalDocumentID 2183928841
23388204
10_1016_j_comnet_2010_05_011
S138912861000157X
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
XFK
ZMT
ZY4
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
AFXIZ
AGCQF
AGRNS
BNPGV
IQODW
SSH
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c461t-57280d820e04b812c6b5dbdb1cb73db277f9c014d5138bc0e11eff8a7ac717de3
ISICitedReferencesCount 128
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000284567000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1389-1286
IngestDate Sun Sep 28 02:38:04 EDT 2025
Mon Nov 17 16:21:56 EST 2025
Mon Jul 21 09:11:14 EDT 2025
Sat Nov 29 08:16:43 EST 2025
Tue Nov 18 21:22:03 EST 2025
Fri Feb 23 02:21:13 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 17
Keywords Message authentication code algorithm
Wireless sensor network
Energy consumption analysis
Symmetric-key encryption algorithm
Block cipher operation modes
Wireless telecommunication
Algorithm
Remote sensing
Military application
Private key
Block ciphering
Security of data
Electric power consumption
Data transmission network
Wireless network
Sensor array
Message authentication
Signal detection
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
CC BY 4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c461t-57280d820e04b812c6b5dbdb1cb73db277f9c014d5138bc0e11eff8a7ac717de3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 763037851
PQPubID 47119
PageCount 12
ParticipantIDs proquest_miscellaneous_831185904
proquest_journals_763037851
pascalfrancis_primary_23388204
crossref_primary_10_1016_j_comnet_2010_05_011
crossref_citationtrail_10_1016_j_comnet_2010_05_011
elsevier_sciencedirect_doi_10_1016_j_comnet_2010_05_011
PublicationCentury 2000
PublicationDate 2010-12-03
PublicationDateYYYYMMDD 2010-12-03
PublicationDate_xml – month: 12
  year: 2010
  text: 2010-12-03
  day: 03
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
– name: Amsterdam
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2010
Publisher Elsevier B.V
Elsevier
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier
– name: Elsevier Sequoia S.A
References B.S. Kaliski Jr., Y.L. Yin, On the security of the RC5 encryption algorithm, RSA Laboratories, September 2006, TR-602, Version 1.0.
Zhu, Setia, Jajodia (bib16) 2006
G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428–433.
Law, Doumen, Hartel (bib9) 2006
Bruce Schneier, 2005.
Tinyness: An overview of TEA and related ciphers, 2004.
Mihir Bellare, Joe Kilian, Phillip Rogaway, Survey and benchmark of block ciphers for wireless sensor networks, in: JCSS 2006, pp. 362–399.
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kokate, Mohamed Younis, A low-energy key management protocol for wireless sensor networks, in: ISCC 2003, pp. 335–340.
Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks, in: ICISS 2008, pp. 258–272.
Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: SenSys 2004, pp. 162–175.
David Malan, Matt Welsh, Michael Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: IEEE SECON 2004, pp. 71–80.
Iwata, Kurosawa (bib27) 2003; 2887
Guido Bertoni, Luca Breveglieri, Matteo Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: PERCOMW 2006, pp. 337.
John Black, Phillip Rogaway, CBC MACs for arbitrary-length messages: the three-key constructions, Advances in Cryptology, Lecture Notes in Computer Science 2000, pp. 197–215.
Biham, Biryukov, Shamir (bib19) 2005; 5
CC2420 Data Sheet, 2007.
.
Jongdeog Lee, Krasimira Kapitanova, Sang H. Son, Supporting multilevel security in wireless sensor networks, University of Virginia Department of Computer Sciences, October 2008, CS-2008-11.
Niels Ferguson, Richard Schroeppel, Doug Whiting, A simple algebraic representation of Rijndael, Selected Areas in Cryptography, LNCS 2001, pp. 103–111.
Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM 2005, pp. 324–328.
Chih-Chun Chang, Sead Muftic, David J. Nagel, Measurement of energy costs of security in wireless sensor nodes, in: ICCCN 2007, pp. 95–102.
David W. Carman, Peter S. Kruus, Brian J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs, The Security Research Division, 2000, number 00-010.
Chang, Nagel, Muftic (bib13) 2007
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: WSNA 2003, pp. 151–159.
Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter, How public key cryptography influences wireless sensor node lifetime, SASN 2006, pp. 169–176.
RSA Laboratories, 2009.
An Liu, Peng Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN 2008, pp. 245–256.
Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, in: IEEE TMC 2005, pp. 128–143.
Perrig, Szewczyk, Wen, Culler, Tygar (bib15) 2001
10.1016/j.comnet.2010.05.011_bib1
10.1016/j.comnet.2010.05.011_bib28
10.1016/j.comnet.2010.05.011_bib26
10.1016/j.comnet.2010.05.011_bib24
10.1016/j.comnet.2010.05.011_bib25
10.1016/j.comnet.2010.05.011_bib22
10.1016/j.comnet.2010.05.011_bib23
10.1016/j.comnet.2010.05.011_bib20
10.1016/j.comnet.2010.05.011_bib21
10.1016/j.comnet.2010.05.011_bib7
Iwata (10.1016/j.comnet.2010.05.011_bib27) 2003; 2887
10.1016/j.comnet.2010.05.011_bib6
10.1016/j.comnet.2010.05.011_bib8
10.1016/j.comnet.2010.05.011_bib3
10.1016/j.comnet.2010.05.011_bib2
10.1016/j.comnet.2010.05.011_bib5
10.1016/j.comnet.2010.05.011_bib4
Biham (10.1016/j.comnet.2010.05.011_bib19) 2005; 5
Law (10.1016/j.comnet.2010.05.011_bib9) 2006
Perrig (10.1016/j.comnet.2010.05.011_bib15) 2001
10.1016/j.comnet.2010.05.011_bib17
10.1016/j.comnet.2010.05.011_bib18
10.1016/j.comnet.2010.05.011_bib14
10.1016/j.comnet.2010.05.011_bib11
10.1016/j.comnet.2010.05.011_bib12
10.1016/j.comnet.2010.05.011_bib10
Chang (10.1016/j.comnet.2010.05.011_bib13) 2007
Zhu (10.1016/j.comnet.2010.05.011_bib16) 2006
References_xml – reference: Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, in: WSNA 2003, pp. 151–159.
– reference: RSA Laboratories, 2009.
– reference: Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in: PERCOM 2005, pp. 324–328.
– start-page: 500
  year: 2006
  end-page: 528
  ident: bib16
  article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks
  publication-title: ACM Transactions on Sensor Networks
– reference: CC2420 Data Sheet, 2007.
– reference: Nachiketh R. Potlapally, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha, A study of the energy consumption characteristics of cryptographic algorithms and security protocols, in: IEEE TMC 2005, pp. 128–143.
– reference: G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428–433.
– start-page: 469
  year: 2007
  end-page: 480
  ident: bib13
  article-title: Balancing security and energy consumption in wireless sensor networks
  publication-title: Mobile Ad-Hoc and Sensor Networks
– reference: Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks, in: ICISS 2008, pp. 258–272.
– volume: 5
  start-page: 291
  year: 2005
  end-page: 311
  ident: bib19
  article-title: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
  publication-title: Journal of Cryptology
– reference: B.S. Kaliski Jr., Y.L. Yin, On the security of the RC5 encryption algorithm, RSA Laboratories, September 2006, TR-602, Version 1.0.
– reference: Jongdeog Lee, Krasimira Kapitanova, Sang H. Son, Supporting multilevel security in wireless sensor networks, University of Virginia Department of Computer Sciences, October 2008, CS-2008-11.
– reference: David Malan, Matt Welsh, Michael Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in: IEEE SECON 2004, pp. 71–80.
– reference: Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kokate, Mohamed Younis, A low-energy key management protocol for wireless sensor networks, in: ISCC 2003, pp. 335–340.
– reference: John Black, Phillip Rogaway, CBC MACs for arbitrary-length messages: the three-key constructions, Advances in Cryptology, Lecture Notes in Computer Science 2000, pp. 197–215.
– reference: Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter, How public key cryptography influences wireless sensor node lifetime, SASN 2006, pp. 169–176.
– reference: Tinyness: An overview of TEA and related ciphers, 2004.
– reference: An Liu, Peng Ning, TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks, in: IPSN 2008, pp. 245–256.
– start-page: 189
  year: 2001
  end-page: 199
  ident: bib15
  article-title: SPINS: security protocols for sensor networks
  publication-title: Wireless Networks
– reference: Niels Ferguson, Richard Schroeppel, Doug Whiting, A simple algebraic representation of Rijndael, Selected Areas in Cryptography, LNCS 2001, pp. 103–111.
– reference: Guido Bertoni, Luca Breveglieri, Matteo Venturi, Power aware design of an elliptic curve coprocessor for 8 bit platforms, in: PERCOMW 2006, pp. 337.
– reference: Chih-Chun Chang, Sead Muftic, David J. Nagel, Measurement of energy costs of security in wireless sensor nodes, in: ICCCN 2007, pp. 95–102.
– volume: 2887
  start-page: 129
  year: 2003
  end-page: 153
  ident: bib27
  article-title: OMAC: one-key CBC MA, fast software encryption
  publication-title: LNCS
– reference: Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: SenSys 2004, pp. 162–175.
– reference: Bruce Schneier, 2005.
– reference: David W. Carman, Peter S. Kruus, Brian J. Matt, Constraints and approaches for distributed sensor network security, NAI Labs, The Security Research Division, 2000, number 00-010.
– start-page: 65
  year: 2006
  end-page: 93
  ident: bib9
  article-title: Survey and benchmark of block ciphers for wireless sensor networks
  publication-title: ACM Transactions on Sensor Networks
– reference: .
– reference: Mihir Bellare, Joe Kilian, Phillip Rogaway, Survey and benchmark of block ciphers for wireless sensor networks, in: JCSS 2006, pp. 362–399.
– ident: 10.1016/j.comnet.2010.05.011_bib25
– ident: 10.1016/j.comnet.2010.05.011_bib23
– ident: 10.1016/j.comnet.2010.05.011_bib6
– ident: 10.1016/j.comnet.2010.05.011_bib18
  doi: 10.1007/3-540-45537-X_8
– ident: 10.1016/j.comnet.2010.05.011_bib11
  doi: 10.1145/941370.941372
– ident: 10.1016/j.comnet.2010.05.011_bib14
  doi: 10.1109/ISCC.2003.1214142
– ident: 10.1016/j.comnet.2010.05.011_bib1
  doi: 10.1145/1031495.1031515
– ident: 10.1016/j.comnet.2010.05.011_bib21
– ident: 10.1016/j.comnet.2010.05.011_bib4
  doi: 10.1109/SAHCN.2004.1381904
– ident: 10.1016/j.comnet.2010.05.011_bib7
  doi: 10.1109/TMC.2006.16
– ident: 10.1016/j.comnet.2010.05.011_bib2
  doi: 10.1109/IPSN.2008.47
– ident: 10.1016/j.comnet.2010.05.011_bib3
  doi: 10.1109/PERCOMW.2006.110
– start-page: 469
  year: 2007
  ident: 10.1016/j.comnet.2010.05.011_bib13
  article-title: Balancing security and energy consumption in wireless sensor networks
  publication-title: Mobile Ad-Hoc and Sensor Networks
  doi: 10.1007/978-3-540-77024-4_43
– volume: 2887
  start-page: 129
  year: 2003
  ident: 10.1016/j.comnet.2010.05.011_bib27
  article-title: OMAC: one-key CBC MA, fast software encryption
  publication-title: LNCS
– start-page: 65
  year: 2006
  ident: 10.1016/j.comnet.2010.05.011_bib9
  article-title: Survey and benchmark of block ciphers for wireless sensor networks
  publication-title: ACM Transactions on Sensor Networks
  doi: 10.1145/1138127.1138130
– ident: 10.1016/j.comnet.2010.05.011_bib5
  doi: 10.1145/1180345.1180366
– ident: 10.1016/j.comnet.2010.05.011_bib24
– start-page: 189
  year: 2001
  ident: 10.1016/j.comnet.2010.05.011_bib15
  article-title: SPINS: security protocols for sensor networks
  publication-title: Wireless Networks
– ident: 10.1016/j.comnet.2010.05.011_bib26
  doi: 10.1007/3-540-44598-6_12
– ident: 10.1016/j.comnet.2010.05.011_bib20
– ident: 10.1016/j.comnet.2010.05.011_bib22
– ident: 10.1016/j.comnet.2010.05.011_bib28
– ident: 10.1016/j.comnet.2010.05.011_bib12
  doi: 10.1109/ICW.2005.47
– start-page: 500
  year: 2006
  ident: 10.1016/j.comnet.2010.05.011_bib16
  article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks
  publication-title: ACM Transactions on Sensor Networks
  doi: 10.1145/1218556.1218559
– volume: 5
  start-page: 291
  year: 2005
  ident: 10.1016/j.comnet.2010.05.011_bib19
  article-title: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
  publication-title: Journal of Cryptology
  doi: 10.1007/s00145-005-0129-3
– ident: 10.1016/j.comnet.2010.05.011_bib10
  doi: 10.1007/978-3-540-89862-7_22
– ident: 10.1016/j.comnet.2010.05.011_bib8
  doi: 10.1109/ICCCN.2007.4317803
– ident: 10.1016/j.comnet.2010.05.011_bib17
SSID ssj0004428
Score 2.4031885
Snippet With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a...
SourceID proquest
pascalfrancis
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 2967
SubjectTerms Algorithms
Applied sciences
Block cipher operation modes
Blocking
Comparative analysis
Computer information security
Costs
Cryptography
Data encryption
Energy consumption
Energy consumption analysis
Exact sciences and technology
Experiments
Message authentication code algorithm
Messages
Military
Miscellaneous
Network security
Networks
Security
Sensors
Services and terminals of telecommunications
Studies
Suitability
Symmetric-key encryption algorithm
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Telemetry. Remote supervision. Telewarning. Remote control
Teleprocessing networks. Isdn
Valuation and optimization of characteristics. Simulation
Wireless communication
Wireless communication systems
Wireless networks
Wireless sensor network
Title The price of security in wireless sensor networks
URI https://dx.doi.org/10.1016/j.comnet.2010.05.011
https://www.proquest.com/docview/763037851
https://www.proquest.com/docview/831185904
Volume 54
WOSCitedRecordID wos000284567000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: AIEXJ
  dateStart: 19990114
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Jb9NAFB6FlgMIsZSihkI1B27Ikh0v4zlaKIiiKq1EQLmNPIujVKkdxeny83mTeeMEIhQ4cLEiLxn5vW_e5rcQ8kGWLM4UY4EEXyCw4ywCHkoWGB0laSXTWKt1n9kLNhrlkwm_6vXufS3M3ZzVdf7wwBf_ldVwDphtS2f_gd3dn8IJ-A1MhyOwHY5_zfiFbRVk7cAWx9PZsIbtSjy3gq0F17VZfqxdBni7bZ_6IQ_dRWuBFje2m4JG6GwqhDGcwPlWOOFiOMSg_FSbZtrJ8-LqfFyMLn8UTrKU7exmtuxUwrfLkQtP11OslsBABCZ1xJvoGKryLWEKxhDchK2uUdq6ltEeVWxbdnI3mAP18IC72T47Mt6FG64ti4AWmJ1nm69GG53mv-P_puq6BMQBeOZg-ySPyOGApRwk-mFxPpx83ZTUJuuxvN0r-KrLdWrg7sp_smqeLcoW9lrlhqTs6Pu1ETN-SZ6j90ELh5pXpGfqI_ICPRGKcr49Ik-32lS-JhFAiq4hRZuKekjRWU09pKiDFPWoOSbfPw_Hn74EOGojUEkWrYLUTinTQBETJhJsPpXJVEstIyVZrOWAsYor8KZ1ChSRKjRRZKoqL1mpWMS0id-Qg7qpzQmhWQXbPsm4zKRMqqrMIwU-acaVMlybsOyT2JNKKOxDb8ehzIVPOLwWjsDCEliEqQAC90nQPbVwfVj23M88FwTaks5GFACjPU-e_cK0bjmPmT459VwUuO9bAWo6jBm4L31Cu6sgqe3nt7I2zW0r8hic-ZSHydt9K5ySJ5sN9o4crJa35j15rO5Ws3Z5hlD9CaapsXA
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+price+of+security+in+wireless+sensor+networks&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=LEE%2C+Jongdeog&rft.au=KAPITANOVA%2C+Krasimira&rft.au=SON%2C+Sang+H&rft.date=2010-12-03&rft.pub=Elsevier&rft.issn=1389-1286&rft.volume=54&rft.issue=17&rft.spage=2967&rft.epage=2978&rft_id=info:doi/10.1016%2Fj.comnet.2010.05.011&rft.externalDBID=n%2Fa&rft.externalDocID=23388204
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon