Study of Two Security Constructs on Throughput for Wireless Sensor Multi-Hop Networks

被引:0
|
作者
Sparrow, R. D. [1 ]
Adekunle, A. A. [1 ]
Berry, R. J. [1 ]
Farnish, R. J. [1 ]
机构
[1] Univ Greenwich, Wolfson Ctr Bulk Solids Handling Technol, Chatham ME4 4TB, Kent, England
关键词
Networked Control Systems; Wireless Sensor Networks; AEAD constructs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the interconnection of devices becoming more widespread in society (e.g. internet of things), networked devices are used in a range of environments from smart grids to smart buildings. Wireless Sensor Networks (WSN) have commonly been utilised as a method of monitoring a set processes. In control networks WSN have been deployed to perform a variety of tasks (i.e. collate and distribute data from an event to an end device). However, the nature of the wireless broadcast medium enables attackers to conduct active and passive attacks. Cryptography is selected as a countermeasure to overcome these security vulnerabilities; however, a drawback of using cryptography is reduced throughput. This paper investigates the impact of two software authenticated encryption with associated data (AEAD) security constructs on packet throughput of multiple hop WSN, being counter with cipher block chaining and message authentication code (CCM) and TinyAEAD. Experiments were conducted in a simulated environment. A case scenario is also presented in this paper to emphasise the impact in a real world context. Results observed indicate that the security constructs examined in this paper affect the average throughput measurements up to three hops.
引用
收藏
页码:1302 / 1307
页数:6
相关论文
共 50 条
  • [1] Throughput analysis in multi-hop wireless sensor networks
    Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Tongxin Xuebao, 2007, 9 (78-84):
  • [2] Throughput Analysis of Wireless Multi-hop Chain Networks
    Liu, Fangqin
    Lin, Chuang
    Wen, Hao
    Ungsunan, Peter
    PROCEEDINGS OF THE 8TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, 2009, : 834 - 839
  • [3] Improving fairness and throughput in multi-hop wireless networks
    Hsieh, HY
    Sivakumar, R
    NETWORKING - ICN 2001, PT I, PROCEEDINGS, 2001, 2093 : 569 - 578
  • [4] Implementation of a Security Framework for Wireless Multi-hop Networks
    Paris, Stefano
    Capone, Antonio
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 107 - 110
  • [5] Control of Multi-Hop Wireless Networks with Security Constraints
    Liu, Qiuming
    Yu, Li
    Zheng, Jun
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [6] Adaptive Multi-hop Routing for Wireless Sensor Networks
    Tanessakulwattana, Sarayoot
    Pornavalai, Chotipat
    Chakraborty, Goutam
    2013 10TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2013, : 105 - 110
  • [7] Coded Addresses in Multi-hop Wireless Sensor Networks
    Ben Saad, Leila
    Tourancheau, Bernard
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 724 - 729
  • [8] Channel coding in multi-hop wireless sensor networks
    Kashani, Zeinab Hajjarian
    Shiva, Mohsen
    2006 6TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS PROCEEDINGS, 2006, : 965 - +
  • [9] Energy Optimization in Multi-hop Wireless Sensor Networks
    Zardosht, Mohammad Javad
    Almodarresi, Seyed Mohammad Taghi
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 450 - 454
  • [10] Study of expected Delay of Multi-hop Desynchronization for Wireless Sensor Networks
    Buranapanichkit, Dujdow
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 1334 - 1337