2010 2nd International Conference on Mechanical and Electronics Engineering 2010
DOI: 10.1109/icmee.2010.5558401
|View full text |Cite
|
Sign up to set email alerts
|

Energy analysis for wireless sensor networks

Abstract: Access control in sensor networks is used to authorize and grant users the right to access the network and data collected by sensors .Different users have different access right due to the access restriction implicated by the data security and confidentiality .Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill the requirement, public-key cryptography is more flexible and simple rendering a clean interface for the Security component .We quantify the energy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…ECC and RSA have also been studied in terms of power consumption in different scenarios (e.g., [37,38]), but such studies fall short in some aspects (e.g., security levels are not taken into account, the consumed energy is just estimated or outdated hardware platforms and insecure/deprecated cipher suites are used). No paper providing a fair comparison of power consumption in real-world IoT devices with proper security levels, which is presented in Section 4, was found.…”
Section: Related Workmentioning
confidence: 99%
“…ECC and RSA have also been studied in terms of power consumption in different scenarios (e.g., [37,38]), but such studies fall short in some aspects (e.g., security levels are not taken into account, the consumed energy is just estimated or outdated hardware platforms and insecure/deprecated cipher suites are used). No paper providing a fair comparison of power consumption in real-world IoT devices with proper security levels, which is presented in Section 4, was found.…”
Section: Related Workmentioning
confidence: 99%
“…ECC and RSA power consumption has been also studied in different scenarios [ 24 , 82 , 83 ]. Moreover, a framework for analyzing power consumption of cryptographic algorithms and security protocols is proposed in [ 84 ].…”
Section: Related Workmentioning
confidence: 99%
“…It is established that ECC is a relatively efficient public key crypto, relevant to RSA and other popular algorithms, thus it is suitable for WSNs [46, 16, 17]. L-PKI utilizes ECC with keys of 160 bits [18].…”
Section: L-pki Protocolmentioning
confidence: 99%