2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems 2007
DOI: 10.1109/mobhoc.2007.4428758
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of Energy Consumption in Wireless Sensor Networks: A Case Study for Security Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 3 publications
0
13
0
Order By: Relevance
“…A more commonly-used methodology for measuring energy consumption is based on the use of an oscilloscope, an operational circuit connected to the target node and a program executing on a PC to analyse the data obtained from the oscilloscope [19], [20]. We build upon this energy monitoring approach, while adding software instrumentation to automate the testing process and providing a model that accurately predicts the energy consumption of software operations.…”
Section: B Experimental Methodsmentioning
confidence: 99%
“…A more commonly-used methodology for measuring energy consumption is based on the use of an oscilloscope, an operational circuit connected to the target node and a program executing on a PC to analyse the data obtained from the oscilloscope [19], [20]. We build upon this energy monitoring approach, while adding software instrumentation to automate the testing process and providing a model that accurately predicts the energy consumption of software operations.…”
Section: B Experimental Methodsmentioning
confidence: 99%
“…By replacing the battery of the nodes with such a capacitor and measuring the voltage before and after a set of operations, it is possible to accurately discern energy consumption due to the predictable discharge profile of capacitors. A more commonly-used methodology for measuring energy consumption is based on the use of an oscilloscope, an operational circuit connected to the target node and a program executing on a PC to analyze the data obtained from the oscilloscope [27], [28]. We build upon this energy monitoring approach, while adding software instrumentation to automate the testing process and providing a model that accurately predicts the energy consumption of software operations.…”
Section: Experimental Methodsmentioning
confidence: 99%
“…An example of this scheme is Kerberos, which was built on the Needham-Schroeder protocol. Kerberos was originally designed to enable two parties to exchange secret information across an otherwise open network [12,13,14].…”
Section: Third Parity Based Schemesmentioning
confidence: 99%