2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784732
|View full text |Cite
|
Sign up to set email alerts
|

On the Power Consumption of Security Algorithms Employed in Wireless Networks

Abstract: Supporting high levels of security in wireless networks is a challenging issue because of the specific problems this environment poses; the provided security by small mobile systems, such as PDAs and mobile phones, is often restricted by their limited battery power and their limited processing power. Driven by these restrictions, the designer will have to decide whether to implement the wireless network security schemes in software or to add special purpose hardware units to the system, executing those CPU int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
3
0
1
Order By: Relevance
“…Thus, all network nodes participate in the trust evaluation process playing a different role. This approach is also followed in References [15] and [16] where a three-tier network architecture (sensor nodes, cluster head, base station/command node) is considered. All nodes evaluate the trust of the cluster head and the relevant value is reported in the base station.…”
Section: Trust Modelsmentioning
confidence: 99%
“…Thus, all network nodes participate in the trust evaluation process playing a different role. This approach is also followed in References [15] and [16] where a three-tier network architecture (sensor nodes, cluster head, base station/command node) is considered. All nodes evaluate the trust of the cluster head and the relevant value is reported in the base station.…”
Section: Trust Modelsmentioning
confidence: 99%
“…Likewise in [29], Masoud et al performed the power consumption from devices of various configuration in comparison to different applications like music, video, games etc. The comparison among various encryption algorithms performed in [30] for the power consumption of varied file sizes. The power consumption of software and hardware implementations of security algorithms executed in [31] and they concluded that hardware FPGA implementations proved to be much faster than the software implementation.…”
Section: A Previous and Related Workmentioning
confidence: 99%
“…For example, encryption is a powerful technique against data privacy attack while authentication is a well-established solution to Sybil attack. However, the implementation of such security measures comes at a high cost since it requires significant memory and processing resources increasing at the same time the power consumption [52]. Focusing on routing attacks, a malicious node may refuse to forward all or part of the received traffic towards the destination (issuing a black-hole or grey-hole attack) exhibiting selfish behaviour.…”
Section: Gradient Broadcast (Grab)mentioning
confidence: 99%