Providing security in energy harvesting sensor networks

In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Pelissier, S, Prabhakar, T V, Jamadagni, H S, VenkateshaPrasad, R, Niemegeers, I
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 456
container_issue
container_start_page 452
container_title
container_volume
creator Pelissier, S
Prabhakar, T V
Jamadagni, H S
VenkateshaPrasad, R
Niemegeers, I
description In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.
doi_str_mv 10.1109/CCNC.2011.5766511
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5766511</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5766511</ieee_id><sourcerecordid>5766511</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-aafa53ffe46598514efcc4bd668f9251679bf2e0f92ee8aed9b42acc043bfccb3</originalsourceid><addsrcrecordid>eNpVT8lqwzAUVGkKDYk_oPTiH7Crp83SsYhuENoecg-y_JSqi10kN8V_X0Ny6VyGYYYZhpAroDUANTfWPtuaUYBaNkpJgDNSmEaDYELoRmt2_k8bsyBLxjlURkt2SYqc3-kMpQxldEma1zQcYhf7fZnR_6Q4TmXsS-wx7afyzaUD5vHo9nlIZY_j75A-8ppcBPeZsTjximzv77b2sdq8PDzZ200VDR0r54KTPAQUSs77IDB4L9pOKR0Mk6Aa0waGdBaI2mFnWsGc91Twdk62fEWuj7UREXffKX65NO1Oz_kfDalLvA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Providing security in energy harvesting sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</creator><creatorcontrib>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</creatorcontrib><description>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</description><identifier>ISSN: 2331-9852</identifier><identifier>ISBN: 9781424487899</identifier><identifier>ISBN: 1424487897</identifier><identifier>EISBN: 9781424487882</identifier><identifier>EISBN: 1424487900</identifier><identifier>EISBN: 1424487889</identifier><identifier>EISBN: 9781424487905</identifier><identifier>DOI: 10.1109/CCNC.2011.5766511</identifier><language>eng</language><publisher>IEEE</publisher><subject>ATmega128 ; Authentication ; AVR ; Cryptography ; Energy harvesting ; Microcontrollers ; MSP430 ; Poly32 ; Security ; Software ; Stream cipher ; Trivium ; Universal hashing ; Wegman-Carter authenticator ; Wireless sensor network ; Wireless sensor networks</subject><ispartof>2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011, p.452-456</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5766511$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5766511$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pelissier, S</creatorcontrib><creatorcontrib>Prabhakar, T V</creatorcontrib><creatorcontrib>Jamadagni, H S</creatorcontrib><creatorcontrib>VenkateshaPrasad, R</creatorcontrib><creatorcontrib>Niemegeers, I</creatorcontrib><title>Providing security in energy harvesting sensor networks</title><title>2011 IEEE Consumer Communications and Networking Conference (CCNC)</title><addtitle>CCNC</addtitle><description>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</description><subject>ATmega128</subject><subject>Authentication</subject><subject>AVR</subject><subject>Cryptography</subject><subject>Energy harvesting</subject><subject>Microcontrollers</subject><subject>MSP430</subject><subject>Poly32</subject><subject>Security</subject><subject>Software</subject><subject>Stream cipher</subject><subject>Trivium</subject><subject>Universal hashing</subject><subject>Wegman-Carter authenticator</subject><subject>Wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>2331-9852</issn><isbn>9781424487899</isbn><isbn>1424487897</isbn><isbn>9781424487882</isbn><isbn>1424487900</isbn><isbn>1424487889</isbn><isbn>9781424487905</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT8lqwzAUVGkKDYk_oPTiH7Crp83SsYhuENoecg-y_JSqi10kN8V_X0Ny6VyGYYYZhpAroDUANTfWPtuaUYBaNkpJgDNSmEaDYELoRmt2_k8bsyBLxjlURkt2SYqc3-kMpQxldEma1zQcYhf7fZnR_6Q4TmXsS-wx7afyzaUD5vHo9nlIZY_j75A-8ppcBPeZsTjximzv77b2sdq8PDzZ200VDR0r54KTPAQUSs77IDB4L9pOKR0Mk6Aa0waGdBaI2mFnWsGc91Twdk62fEWuj7UREXffKX65NO1Oz_kfDalLvA</recordid><startdate>201101</startdate><enddate>201101</enddate><creator>Pelissier, S</creator><creator>Prabhakar, T V</creator><creator>Jamadagni, H S</creator><creator>VenkateshaPrasad, R</creator><creator>Niemegeers, I</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201101</creationdate><title>Providing security in energy harvesting sensor networks</title><author>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-aafa53ffe46598514efcc4bd668f9251679bf2e0f92ee8aed9b42acc043bfccb3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>ATmega128</topic><topic>Authentication</topic><topic>AVR</topic><topic>Cryptography</topic><topic>Energy harvesting</topic><topic>Microcontrollers</topic><topic>MSP430</topic><topic>Poly32</topic><topic>Security</topic><topic>Software</topic><topic>Stream cipher</topic><topic>Trivium</topic><topic>Universal hashing</topic><topic>Wegman-Carter authenticator</topic><topic>Wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Pelissier, S</creatorcontrib><creatorcontrib>Prabhakar, T V</creatorcontrib><creatorcontrib>Jamadagni, H S</creatorcontrib><creatorcontrib>VenkateshaPrasad, R</creatorcontrib><creatorcontrib>Niemegeers, I</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pelissier, S</au><au>Prabhakar, T V</au><au>Jamadagni, H S</au><au>VenkateshaPrasad, R</au><au>Niemegeers, I</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Providing security in energy harvesting sensor networks</atitle><btitle>2011 IEEE Consumer Communications and Networking Conference (CCNC)</btitle><stitle>CCNC</stitle><date>2011-01</date><risdate>2011</risdate><spage>452</spage><epage>456</epage><pages>452-456</pages><issn>2331-9852</issn><isbn>9781424487899</isbn><isbn>1424487897</isbn><eisbn>9781424487882</eisbn><eisbn>1424487900</eisbn><eisbn>1424487889</eisbn><eisbn>9781424487905</eisbn><abstract>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</abstract><pub>IEEE</pub><doi>10.1109/CCNC.2011.5766511</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2331-9852
ispartof 2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011, p.452-456
issn 2331-9852
language eng
recordid cdi_ieee_primary_5766511
source IEEE Electronic Library (IEL) Conference Proceedings
subjects ATmega128
Authentication
AVR
Cryptography
Energy harvesting
Microcontrollers
MSP430
Poly32
Security
Software
Stream cipher
Trivium
Universal hashing
Wegman-Carter authenticator
Wireless sensor network
Wireless sensor networks
title Providing security in energy harvesting sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T11%3A30%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Providing%20security%20in%20energy%20harvesting%20sensor%20networks&rft.btitle=2011%20IEEE%20Consumer%20Communications%20and%20Networking%20Conference%20(CCNC)&rft.au=Pelissier,%20S&rft.date=2011-01&rft.spage=452&rft.epage=456&rft.pages=452-456&rft.issn=2331-9852&rft.isbn=9781424487899&rft.isbn_list=1424487897&rft_id=info:doi/10.1109/CCNC.2011.5766511&rft_dat=%3Cieee_6IE%3E5766511%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424487882&rft.eisbn_list=1424487900&rft.eisbn_list=1424487889&rft.eisbn_list=9781424487905&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5766511&rfr_iscdi=true