DOI: 10.1007/978-3-540-79590-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Rijndal outperformed its competitors in terms of efficiency and to date has gained acceptance in various fields, including lowpower embedded systems [15] and RFID [10]. Several publications report about investigations of the resource needs of AES implemented in 8-bit [17] and 16-bit [7] microcontrollers as well as in hardware [13]. The authors of [7] implemented AES in C resulting in ROM and RAM requirements of 5160 bytes and 260 bytes, respectively.…”
Section: The Advanced Encryption Standard (Aes)mentioning
confidence: 97%
“…Rijndal outperformed its competitors in terms of efficiency and to date has gained acceptance in various fields, including lowpower embedded systems [15] and RFID [10]. Several publications report about investigations of the resource needs of AES implemented in 8-bit [17] and 16-bit [7] microcontrollers as well as in hardware [13]. The authors of [7] implemented AES in C resulting in ROM and RAM requirements of 5160 bytes and 260 bytes, respectively.…”
Section: The Advanced Encryption Standard (Aes)mentioning
confidence: 97%
“…Healy et al [32] have a look on the benefits of using hardware encryption for symmetric encryption to reduce encrypting costs. Thus, the authors investigate the use of an AES encryption module that is available on the Chipcon CC2420 transceiver chip as used for MICAz and TmoteSKY nodes.…”
Section: Symmetric Cryptographymentioning
confidence: 99%
“…In our scheme, the order of the two processes is not of concern since they are done in one step by one unit. The authors in [2] pointed out how physical layer encryption is taking significant importance in wireless network security. They propose an efficient physical layer encryption that relies on implementation of OFB mode just after error correction.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, there has been a lot interest in implementing encryption at the physical layer. The authors in [2] pointed out that the best and often the only way to secure data in a wireless sensor network is to encrypt the data using a secure encryption algorithm before it is transmitted over the air ways. They pointed out that the cost of software-based encryption procedure could outweigh the risks of the transmission being intercepted because of the constraint nature of resources, memory, and clock speeds on the sensor nodes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation