2007 16th International Conference on Computer Communications and Networks 2007
DOI: 10.1109/icccn.2007.4317803
|View full text |Cite
|
Sign up to set email alerts
|

Measurement of Energy Costs of Security in Wireless Sensor Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…Chang et al [8], [9] use a setup similar to ours to measure the energy consumption introduced by hash functions and symmetric-key algorithms on Mica2 motes with a CC1000 radio and Ember sensors with an EM2420 radio. They use a PicoScope 3206 oscilloscope to sample the voltage drop across two registers and, based on the measured data, speculate about the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Chang et al [8], [9] use a setup similar to ours to measure the energy consumption introduced by hash functions and symmetric-key algorithms on Mica2 motes with a CC1000 radio and Ember sensors with an EM2420 radio. They use a PicoScope 3206 oscilloscope to sample the voltage drop across two registers and, based on the measured data, speculate about the energy consumption.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the previous papers, except [8] and [9], have used simulation for their evaluations. We, however, believe that directly measuring the current through the motes and the latency caused by the security algorithms provides more realistic data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We take CrossBow node and Ember node as the nodes for our discussion. They will, respectively, consume 154 J and 75 J to execute a SHA-1 function once [14]. If = 40 m, = 53, and NF = 241, then the nodes CrossBow and Ember will consume 37.1 mJ and 18.0 mJ to establish their pairwise keys, respectively.…”
Section: Energy Consumption Analysismentioning
confidence: 99%
“…This data rate is to be differentiated from the MicaZ claimed data rate (of 250 kbps) and is far less (at 121 kbps), further reduced by the headers and footers appended to the data by the lower layers of the communication stack. For symmetric encryption, we use energy measurements for the hardware [45] 1.83 µJ SHA-1 Hash (64 bits) [46] 154 µJ ECDSA-160 Sign [47] 52 mJ Transmit 1 bit [47] 0.6 µJ AES implementation provided by the CC2420 radio on the MicaZ motes. This is a far cheaper and more convenient option than using a software implementation of a symmetric cipher.…”
Section: Energy Comparisonmentioning
confidence: 99%