메뉴 건너뛰기




Volumn 10, Issue 4, 2011, Pages 192-201

Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node

Author keywords

Advanced encryption standard; AES; Cryptography; Energy consumption.; Energy efficiency; MicaZ sensor node; Performance analysis; Wireless sensor networks; WSN

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; ENERGY EFFICIENCY; SENSOR NODES; TRAFFIC CONTROL;

EID: 80053600885     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2011.042767     Document Type: Article
Times cited : (39)

References (37)
  • 1
    • 80053610312 scopus 로고    scopus 로고
    • Agilent, DVM Datasheet, accessed on 4 April 2010
    • Agilent (2007) 66321D Mobile Comm DC Source w/ Battery Emulation, DVM Datasheet. Available online at: http://www.home.agilent.com/agilent/product. jspx?cc=US&lc=eng&nid=-35489.536881812 (accessed on 4 April 2010).
    • (2007) 66321D Mobile Comm DC Source W/ Battery Emulation
  • 2
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) 'Wireless sensor networks: a survey', Computer Networks, Vol. 38, No. 4, pp.393-422. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 5
    • 80053591451 scopus 로고    scopus 로고
    • CC2420 datasheet
    • Chipcon, accessed on 8 August 2011
    • Chipcon (2004) 'CC2420 datasheet', Chipcon. Available online at: http://www.ti.com/lit/ds/symlink/cc2420.pdf (accessed on 8 August 2011).
    • (2004) Chipcon
  • 6
    • 33751425404 scopus 로고    scopus 로고
    • Energy-efficient platform designs for real-world wireless sensing application
    • November, San Jose, CA
    • Chou, P.H. and Park, C. (2005) 'Energy-efficient platform designs for real-world wireless sensing application', Proceedings of the International Conference on Computer-Aided Design, November, San Jose, CA, pp.913-920.
    • (2005) Proceedings of the International Conference on Computer-Aided Design , pp. 913-920
    • Chou, P.H.1    Park, C.2
  • 7
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Courtois, N. and Pieprzyk, J. (2002) 'Cryptanalysis of block ciphers with overdefined systems of equations', Lecture Notes in Computer Science, Vol. 2501, pp.267-287.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 8
    • 80053613235 scopus 로고    scopus 로고
    • MICAZ datasheet
    • CrossBow, (accessed on 8 August 2011)
    • CrossBow (2010) 'MICAZ Datasheet', CrossBow. Available online at: http://www.openautomation.net/uploadsproductos/micaz-datasheet.pdf (accessed on 8 August 2011).
    • (2010) CrossBow
  • 9
    • 0004777155 scopus 로고    scopus 로고
    • Resistance Against Implementation Attacks. A Comparative Study of the AES proposals
    • 22-23 March, Rome, Italy
    • Daemen, J. and Rijmen, V. (1999) 'Resistance Against Implementation Attacks. A Comparative Study of the AES proposals', 2nd Advanced Encryption Standard Candidate Conference, 22-23 March, Rome, Italy.
    • (1999) 2nd Advanced Encryption Standard Candidate Conference
    • Daemen, J.1    Rijmen, V.2
  • 11
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption Standard FIPS-197
    • FIPS 197, accessed on 4 April 2010
    • FIPS 197 (2001) 'Advanced encryption Standard FIPS-197', Federal Information Processing Standards. Available online at: http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf (accessed on 4 April 2010).
    • (2001) Federal Information Processing Standards
  • 12
    • 58449131864 scopus 로고    scopus 로고
    • A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
    • Galindo, D., Roman, R. and Lopez, J. (2008) 'A killer application for pairings: authenticated key establishment in underwater wireless sensor networks', Lecture Notes in Computer Science, Vol. 5339, pp.120-132
    • (2008) Lecture Notes in Computer Science , vol.5339 , pp. 120-132
    • Galindo, D.1    Roman, R.2    Lopez, J.3
  • 14
    • 0029457297 scopus 로고
    • Comparing algorithms for dynamic speed-setting of a low-power CPU
    • November, Berkeley, CA
    • Govil, K., Chan, E. and Wasserman, H. (1995) 'Comparing algorithms for dynamic speed-setting of a low-power CPU', Proceedings of the ACM MobiCom'95, November, Berkeley, CA, pp.13-25.
    • (1995) Proceedings of the ACM MobiCom'95 , pp. 13-25
    • Govil, K.1    Chan, E.2    Wasserman, H.3
  • 15
    • 33745960177 scopus 로고    scopus 로고
    • National policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information
    • Hathaway, L. (2003) 'National policy on the use of the advanced encryption standard (AES) to protect national security systems and national security information', National Security Agency.
    • (2003) National Security Agency
    • Hathaway, L.1
  • 16
    • 34547663417 scopus 로고    scopus 로고
    • Efficiently securing data on a wireless sensor network
    • Healy, M., Newe, T. and Lewis, E. (2007) 'Efficiently securing data on a wireless sensor network', Journal of Physics: Conference Series, Vol. 76, No. 1, pp.1-6.
    • (2007) Journal of Physics: Conference Series , vol.76 , Issue.1 , pp. 1-6
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 19
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • DOI 10.1145/1138127.1138130
    • Law, Y.W., Doumen, J. and Hartel, P. (2006) 'Survey and benchmark of block ciphers for wireless sensor networks', ACM Transaction on Sensor Networks, Vol. 2, No. 1, pp.65-93. (Pubitemid 43925113)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 21
    • 0030393551 scopus 로고    scopus 로고
    • Reducing processor power consumption by improving processor time management in a singleuser operating system
    • 11-12 November, New York
    • Lorch, J. and Smith, A. (1996) 'Reducing processor power consumption by improving processor time management in a singleuser operating system', Proceedings of the ACM MobiCom'96, 11-12 November, New York, pp.143-154.
    • (1996) Proceedings of the ACM MobiCom'96 , pp. 143-154
    • Lorch, J.1    Smith, A.2
  • 25
    • 74549175881 scopus 로고    scopus 로고
    • Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs
    • Olteanu, A. and Xiao, Y. (2010) 'Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs', IEEE Transactions on Wireless Communications, Vol. 9, No. 1, pp.218-226.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 218-226
    • Olteanu, A.1    Xiao, Y.2
  • 26
    • 73049106910 scopus 로고    scopus 로고
    • Optimization between AES security and performance for IEEE 802.15.3 WPAN
    • Olteanu, A., Xiao, Y. and Zhang, Y. (2009) 'Optimization between AES security and performance for IEEE 802.15.3 WPAN', IEEE Transactions on Wireless Communications, Vol. 8, No. 12, pp.6030-6037.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.12 , pp. 6030-6037
    • Olteanu, A.1    Xiao, Y.2    Zhang, Y.3
  • 28
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Anderson, R., Gollmann, D. and Preneel, B. (Eds), Springer- Verlag, Leuven
    • Rivest, R. (1995) 'The RC5 encryption algorithm', in Anderson, R., Gollmann, D. and Preneel, B. (Eds): Proceeding of the Leuven Workshop on Fast Software Encryption, Springer-Verlag, Leuven, pp.86-96.
    • (1995) Proceeding of the Leuven Workshop on Fast Software Encryption , pp. 86-96
    • Rivest, R.1
  • 29
    • 11144332044 scopus 로고    scopus 로고
    • The design space of wireless sensor networks
    • DOI 10.1109/MWC.2004.1368897
    • Romer, K. and Mattern, F. (2004) 'The design space of wireless sensor networks', IEEE Wireless Communications, Vol. 6, No. 11, pp.54-61. (Pubitemid 40021190)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 54-61
    • Romer, K.1    Mattern, F.2
  • 32
    • 34047175423 scopus 로고    scopus 로고
    • Rijndael for Sensor Networks: Is Speed the Main Issue?
    • DOI 10.1016/j.entcs.2006.11.010, PII S1571066107000692
    • Vitaletti, A. and Palombizio, G. (2007) 'Rijndael for sensor networks: is speed the main issue?', Electronic Notes in Theoretical Computer Science, Vol. 171, No. 1, pp.71-81. (Pubitemid 46529338)
    • (2007) Electronic Notes in Theoretical Computer Science , vol.171 , Issue.SPEC. ISS. , pp. 71-81
    • Vitaletti, A.1    Palombizio, G.2
  • 34
    • 50949086696 scopus 로고    scopus 로고
    • Performance analysis of advanced encryption standard (AES)
    • 27 November-1 December, San Francisco, CA
    • Xiao, Y., Sun, B., Chen, H., Guizani, S. and Wang, R. (2006b) 'Performance analysis of advanced encryption standard (AES)', Proceedings of GLOBECOM 2006, 27 November-1 December, San Francisco, CA.
    • (2006) Proceedings of GLOBECOM 2006
    • Xiao, Y.1    Sun, B.2    Chen, H.3    Guizani, S.4    Wang, R.5
  • 36
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • Yick, J., Mukherjee, B. and Ghosal, D. (2008) 'Wireless sensor network survey', Computer Networks, Vol. 52, No. 12, pp.2292-2330.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.