Comparison of hardware and software based encryption for secure communication in wireless sensor networks

This paper deals with the energy efficient issue of cryptographic mechanisms used for secure communication between devices in wireless sensor networks. Since these devices are mainly targeted for low power consumption appliances, there is an effort for optimization of any aspects needed for regular sensor operation. On a basis of utilization of hardware cryptographic accelerators integrated in microcontrollers, this article provides the comparison between software and hardware solutions. Proposed work examines the problems and solutions for implementation of security algorithms for WSN devices. Because the speed of hardware accelerator should be much higher than the software implementation, there are examination tests of energy consumption and validation of performance of this feature. Main contribution of the article is real testbed evaluation of the time latency and energy requirements needed for securing the communication. In addition, global evaluation for all important network communication parameters like throughput, delay and delivery ratio are also provided.

[1]  Bruce Schneier,et al.  Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.

[2]  J.C. Hernandez,et al.  New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[3]  Scott F. Midkiff,et al.  Performance and energy efficiency of block ciphers in personal digital assistants , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Fei Yuan,et al.  XTEA encryption based novel RFID security protocol , 2011, 2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE).