Using encryption for authentication: Wireless sensor network case

Investor logo

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

JURNEČKA Filip MATYÁŠ Václav

Year of publication 2013
Type Article in Proceedings
Conference 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN)
MU Faculty or unit

Faculty of Informatics

Citation
Web http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6603089&tag=1
Doi http://dx.doi.org/10.1109/MWSN.2013.6603089
Field Informatics
Keywords Authentication;Encryption;Hardware;Random access memory;Timing;Wireless sensor networks
Description In this paper we discuss the possibility of using encryption to provide authenticity and explore various options for using authentication primitives, namely MAC, to provide confidentiality in wireless sensor networks. We briefly discuss the theoretical background and focus more deeply on the performance questions. We have found and implemented a set of both encryption and MAC functions, measured the timings and memory requirements of these on a mainstream wireless sensor node. Our paper also brings a performance analysis of existing cryptographic implementations.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.