Comparison between RSA hardware and software implementation for WSNs security schemes

The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.

[1]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[2]  B. Kadri,et al.  Secured Clustering Algorithm for Mobile Ad Hoc Networks , 2007 .

[3]  Petr Hanácek,et al.  Power Consumption of Hardware Cryptography Platform for Wireless Sensor , 2009, 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[4]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[5]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[6]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[7]  Kris Gaj,et al.  Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware , 2000, AES Candidate Conference.

[8]  J. Redi,et al.  A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.

[9]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Elfed Lewis,et al.  Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes , 2008 .

[11]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[12]  M. Bouaziz,et al.  An Introduction to Computer Security , 2012 .

[13]  Magdy Saeb,et al.  FPGA implementation of the "pyramids" block cipher , 2005, Proceedings 2005 IEEE International SOC Conference.

[14]  Sun-Min Hwang,et al.  An Efficient Topology Control and Dynamic Interval Scheduling Scheme for 6LoWPAN , 2009, ICCSA.

[15]  Sanjay Kumar Madria,et al.  Practical algorithm for data security (PADS) in wireless sensor networks , 2007, MobiDE '07.

[16]  Mohammad S. Obaidat,et al.  Security in wireless sensor networks , 2009, Secur. Commun. Networks.