Providing security in energy harvesting sensor networks
In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indi...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 456 |
---|---|
container_issue | |
container_start_page | 452 |
container_title | |
container_volume | |
creator | Pelissier, S Prabhakar, T V Jamadagni, H S VenkateshaPrasad, R Niemegeers, I |
description | In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices. |
doi_str_mv | 10.1109/CCNC.2011.5766511 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5766511</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5766511</ieee_id><sourcerecordid>5766511</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-aafa53ffe46598514efcc4bd668f9251679bf2e0f92ee8aed9b42acc043bfccb3</originalsourceid><addsrcrecordid>eNpVT8lqwzAUVGkKDYk_oPTiH7Crp83SsYhuENoecg-y_JSqi10kN8V_X0Ny6VyGYYYZhpAroDUANTfWPtuaUYBaNkpJgDNSmEaDYELoRmt2_k8bsyBLxjlURkt2SYqc3-kMpQxldEma1zQcYhf7fZnR_6Q4TmXsS-wx7afyzaUD5vHo9nlIZY_j75A-8ppcBPeZsTjximzv77b2sdq8PDzZ200VDR0r54KTPAQUSs77IDB4L9pOKR0Mk6Aa0waGdBaI2mFnWsGc91Twdk62fEWuj7UREXffKX65NO1Oz_kfDalLvA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Providing security in energy harvesting sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</creator><creatorcontrib>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</creatorcontrib><description>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</description><identifier>ISSN: 2331-9852</identifier><identifier>ISBN: 9781424487899</identifier><identifier>ISBN: 1424487897</identifier><identifier>EISBN: 9781424487882</identifier><identifier>EISBN: 1424487900</identifier><identifier>EISBN: 1424487889</identifier><identifier>EISBN: 9781424487905</identifier><identifier>DOI: 10.1109/CCNC.2011.5766511</identifier><language>eng</language><publisher>IEEE</publisher><subject>ATmega128 ; Authentication ; AVR ; Cryptography ; Energy harvesting ; Microcontrollers ; MSP430 ; Poly32 ; Security ; Software ; Stream cipher ; Trivium ; Universal hashing ; Wegman-Carter authenticator ; Wireless sensor network ; Wireless sensor networks</subject><ispartof>2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011, p.452-456</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5766511$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5766511$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pelissier, S</creatorcontrib><creatorcontrib>Prabhakar, T V</creatorcontrib><creatorcontrib>Jamadagni, H S</creatorcontrib><creatorcontrib>VenkateshaPrasad, R</creatorcontrib><creatorcontrib>Niemegeers, I</creatorcontrib><title>Providing security in energy harvesting sensor networks</title><title>2011 IEEE Consumer Communications and Networking Conference (CCNC)</title><addtitle>CCNC</addtitle><description>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</description><subject>ATmega128</subject><subject>Authentication</subject><subject>AVR</subject><subject>Cryptography</subject><subject>Energy harvesting</subject><subject>Microcontrollers</subject><subject>MSP430</subject><subject>Poly32</subject><subject>Security</subject><subject>Software</subject><subject>Stream cipher</subject><subject>Trivium</subject><subject>Universal hashing</subject><subject>Wegman-Carter authenticator</subject><subject>Wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>2331-9852</issn><isbn>9781424487899</isbn><isbn>1424487897</isbn><isbn>9781424487882</isbn><isbn>1424487900</isbn><isbn>1424487889</isbn><isbn>9781424487905</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT8lqwzAUVGkKDYk_oPTiH7Crp83SsYhuENoecg-y_JSqi10kN8V_X0Ny6VyGYYYZhpAroDUANTfWPtuaUYBaNkpJgDNSmEaDYELoRmt2_k8bsyBLxjlURkt2SYqc3-kMpQxldEma1zQcYhf7fZnR_6Q4TmXsS-wx7afyzaUD5vHo9nlIZY_j75A-8ppcBPeZsTjximzv77b2sdq8PDzZ200VDR0r54KTPAQUSs77IDB4L9pOKR0Mk6Aa0waGdBaI2mFnWsGc91Twdk62fEWuj7UREXffKX65NO1Oz_kfDalLvA</recordid><startdate>201101</startdate><enddate>201101</enddate><creator>Pelissier, S</creator><creator>Prabhakar, T V</creator><creator>Jamadagni, H S</creator><creator>VenkateshaPrasad, R</creator><creator>Niemegeers, I</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201101</creationdate><title>Providing security in energy harvesting sensor networks</title><author>Pelissier, S ; Prabhakar, T V ; Jamadagni, H S ; VenkateshaPrasad, R ; Niemegeers, I</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-aafa53ffe46598514efcc4bd668f9251679bf2e0f92ee8aed9b42acc043bfccb3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>ATmega128</topic><topic>Authentication</topic><topic>AVR</topic><topic>Cryptography</topic><topic>Energy harvesting</topic><topic>Microcontrollers</topic><topic>MSP430</topic><topic>Poly32</topic><topic>Security</topic><topic>Software</topic><topic>Stream cipher</topic><topic>Trivium</topic><topic>Universal hashing</topic><topic>Wegman-Carter authenticator</topic><topic>Wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Pelissier, S</creatorcontrib><creatorcontrib>Prabhakar, T V</creatorcontrib><creatorcontrib>Jamadagni, H S</creatorcontrib><creatorcontrib>VenkateshaPrasad, R</creatorcontrib><creatorcontrib>Niemegeers, I</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pelissier, S</au><au>Prabhakar, T V</au><au>Jamadagni, H S</au><au>VenkateshaPrasad, R</au><au>Niemegeers, I</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Providing security in energy harvesting sensor networks</atitle><btitle>2011 IEEE Consumer Communications and Networking Conference (CCNC)</btitle><stitle>CCNC</stitle><date>2011-01</date><risdate>2011</risdate><spage>452</spage><epage>456</epage><pages>452-456</pages><issn>2331-9852</issn><isbn>9781424487899</isbn><isbn>1424487897</isbn><eisbn>9781424487882</eisbn><eisbn>1424487900</eisbn><eisbn>1424487889</eisbn><eisbn>9781424487905</eisbn><abstract>In this work, we study the adaptability of well known cryptography algorithms to energy harvesting wireless sensor networks. We are particularly interested in algorithms that have the ability to adapt to varying power in such networks. Our investigations and implementation on hardware platforms indicate that it is optimal to precompute a few key stream bytes, store in memory and later used during the time when the system is low on harvested power level. Our demonstrable setup shows using a precomputed key stream can decrease the energy consumption by 14%. We have implemented the Trivium stream cipher for two different microcontrollers, the MSP430 and the AVR ATmega1281 and show the performance results for these implementations. We have implemented an algorithm based on universal hash functions to provide message authentication with the assistance of stream ciphers. We show that this authentication algorithm has exciting properties for energy harvesting system and more generally for resource constrained devices.</abstract><pub>IEEE</pub><doi>10.1109/CCNC.2011.5766511</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2331-9852 |
ispartof | 2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011, p.452-456 |
issn | 2331-9852 |
language | eng |
recordid | cdi_ieee_primary_5766511 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | ATmega128 Authentication AVR Cryptography Energy harvesting Microcontrollers MSP430 Poly32 Security Software Stream cipher Trivium Universal hashing Wegman-Carter authenticator Wireless sensor network Wireless sensor networks |
title | Providing security in energy harvesting sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T11%3A30%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Providing%20security%20in%20energy%20harvesting%20sensor%20networks&rft.btitle=2011%20IEEE%20Consumer%20Communications%20and%20Networking%20Conference%20(CCNC)&rft.au=Pelissier,%20S&rft.date=2011-01&rft.spage=452&rft.epage=456&rft.pages=452-456&rft.issn=2331-9852&rft.isbn=9781424487899&rft.isbn_list=1424487897&rft_id=info:doi/10.1109/CCNC.2011.5766511&rft_dat=%3Cieee_6IE%3E5766511%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424487882&rft.eisbn_list=1424487900&rft.eisbn_list=1424487889&rft.eisbn_list=9781424487905&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5766511&rfr_iscdi=true |