Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks 2011
DOI: 10.1145/2069105.2069114
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of HIP diet exchange for WSN security establishment

Abstract: Wireless Sensor Nodes are powered by limited batteries and equipped with constrained processor and memory. Therefore, security protocol must be highly efficient to fit WSNs. Meanwhile, considering the large variety of WSN applications and wide deployment, scalability and interoperability are two important concerns of adopting standardized communication protocols. HIP DEX, an IETF Internet draft, provides a generic solution to establish secure connections in WSNs. In this paper, we investigate the security feat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…As explained in [8] and [19], the message flow of HIP Diet Exchange (HIP DEX) protocol is depicted in Fig. 2.…”
Section: Hip Dex Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…As explained in [8] and [19], the message flow of HIP Diet Exchange (HIP DEX) protocol is depicted in Fig. 2.…”
Section: Hip Dex Protocolmentioning
confidence: 99%
“…Host Identity Protocol (HIP) is an IETF standard, that establishes secure signalling channels which inherently support node mobility and multihoming [8,9]. With proper adaptations, HIP is also identified as a suitable key establishment protocol for securing IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…The voltage (i.e., 3 V(volt)) and the current (i.e., 1.8 µA (microamp)) values are directly obtained from TelosB data-sheet [32]. By multiplying the values of V and I with the execution time (t), we can determine the amount of energy required to execute the ECC, AES, and SHA-1 operations [25], [35], [36]. As we can seen in Table II, the total amount of energy consumed in ECC, AES and SHA-1 is (≈) 15,148 µJ.…”
Section: B Evaluationmentioning
confidence: 99%
“…To prove feasibility of our proposal we have made a prototype implementation. It is based on low-level ANSI C KP interface provided within SmartSlog SDK [15] and Redland SIB [17]. We use HDX++ library for HIP DEX protocol.…”
Section: __________________________________________proceeding Of the mentioning
confidence: 99%