首页 | 官方网站   微博 | 高级检索  
     


Survey and comparison of message authentication solutions on wireless sensor networks
Authors:Marcos A Simplicio  Bruno T de Oliveira  Cintia B Margi  Paulo SLM Barreto  Tereza CMB Carvalho  Mats Näslund
Affiliation:1. Escola Politécnica – University of São Paulo, São Paulo, Brazil;2. Ericsson Research, Stockholm, Sweden;1. University of the Basque Country, EUITI Bilbao, Plaza de la Casilla 3, 48012 Bilbao, Spain;2. University of the Basque Country, ETSI Bilbao, Alameda Urquijo s/n, 48013 Bilbao, Spain;1. School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ 85287, United States;2. School of Electrical and Computer Engineering, Purdue University, 465 Northwestern Avenue, West Lafayette, IN 47907, United States;1. Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent ST4 2DF, UK;2. School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow G4 0BA, UK;1. Department of Computer Science and Engineering, Oakland University, Rochester, MI, United States;2. Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, United States
Abstract:Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号