2010
DOI: 10.1007/978-3-642-17502-2_14
|View full text |Cite
|
Sign up to set email alerts
|

AES Data Encryption in a ZigBee Network: Software or Hardware?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…This security feature is used to protect the network against attempts to inject bad traffic into the network and thus consuming network resources, transmitting packets which cannot be decrypted or used in the network. A packet secured at network layer is presented in Figure 3, having the following components: NWK Header, AUX Header, NWK Payload, and MIC [20,21].…”
Section: Zigbee Stack-network Layer Securitymentioning
confidence: 99%
“…This security feature is used to protect the network against attempts to inject bad traffic into the network and thus consuming network resources, transmitting packets which cannot be decrypted or used in the network. A packet secured at network layer is presented in Figure 3, having the following components: NWK Header, AUX Header, NWK Payload, and MIC [20,21].…”
Section: Zigbee Stack-network Layer Securitymentioning
confidence: 99%
“…Numerous papers discuss AES hardware implementations in various technologies that are very com- It is well understood that hardware encryption can reduce the energy consumption. However, in practice a balance needs to be found between the additional hardware cost and the reduction of energy consumption, hence it is not obvious that hardware encryption is always the best solution [14]. In order to find this equilibrium, we have compared the energy consumption of different hardware and software implementations.…”
Section: Introductionmentioning
confidence: 99%