2011
DOI: 10.1504/ijsnet.2011.042767
|View full text |Cite
|
Sign up to set email alerts
|

Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node

Abstract: Many of the diverse Wireless Sensor Network (WSN) applications, such as home automation, traffic control and medical patient monitoring, have a strong requirement for the confidentiality of sensing data. At the same time, the restricted resources of WSN nodes demand that applications are implemented as efficiently as possible. Recently, the Advanced Encryption Standard (AES) has been proposed as the preferable symmetric cipher for WSN applications. This paper presents a performance and energy consumption analy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 32 publications
0
19
0
Order By: Relevance
“…They do not however study this implementation on different plaintext lengths and instead rely on datasheets to extend to lengths longer than one block. However, this conclusion is not backed by Zhang et al in [6] which compares different AES implementations on the MicaZ nodes. They conclude that hardware assisted encryption is faster, but also consumes more energy due to the external chip which handles the computation in hardware.…”
Section: Related Workmentioning
confidence: 87%
See 2 more Smart Citations
“…They do not however study this implementation on different plaintext lengths and instead rely on datasheets to extend to lengths longer than one block. However, this conclusion is not backed by Zhang et al in [6] which compares different AES implementations on the MicaZ nodes. They conclude that hardware assisted encryption is faster, but also consumes more energy due to the external chip which handles the computation in hardware.…”
Section: Related Workmentioning
confidence: 87%
“…We also refer to these hybrids as hardware implementations. For the pure software implementation we used an optimized version of AES, called TableLookupAES [6].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The plaintext is initially organised into a State array, which is a 4x4 array of bytes, and the key is expanded into the required number of round keys [60]. Each round consists of 4 operations, AddRoundKey (combine each round key with the state), SubBytes (replace each byte with another according to Rijndael"s S-Box), ShiftRows (shift each row with a certain offset) and MixColumns (the 4 bytes in every column are combined using an invertible linear transformation).…”
Section: Department Of Electrical Electronic and Computer Engineerinmentioning
confidence: 99%
“…It was however found that it is still feasible for use on these wireless devices. There have also been many proposed optimised implementations that improve the algorithms performance [60].…”
Section: Department Of Electrical Electronic and Computer Engineerinmentioning
confidence: 99%