A Survey of Security Protocols in WSN and Overhead Evaluation

被引:1
|
作者
Sathyadevan, Shiju [1 ]
Prabhakaranl, Subi [1 ]
Bipin, K. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cyber Secur Syst & Networks, Kollam 691572, Kerala, India
关键词
Wireless Sensor Networks; Security Mechanisms; Symmetric Encryption; AES; RC5; Skipjack;
D O I
10.1007/978-3-319-12012-6_81
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There has been a widespread growth in the area of wireless sensor networks mainly because of the tremendous possibility of using it in a wide spectrum of applications such as home automation, wildlife monitoring, defense applications, medical applications and so on. However, due to the inherent limitations of sensor networks, commonly used security mechanisms are hard to implement in these networks. For this very reason, security becomes a crucial issue and these networks face a wide variety of attacks right from the physical layer to application layer. This paper present a survey that investigates the overhead due to the implementation of some common security mechanisms viz. SPINS, TinySec and MiniSec and also the computational overhead in the implementation of three popular symmetric encryption algorithms namely RC5 AES and Skipjack.
引用
收藏
页码:729 / 738
页数:10
相关论文
共 50 条
  • [1] Security Protocols in WSN: A Survey
    Ayyappan, B.
    Kumar, P. Mohan
    [J]. 2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 301 - 304
  • [2] WSN Protocols and Security Challenges for Environmental Monitoring Applications: A Survey
    Adu-Manu, Kofi Sarpong
    Engmann, Felicia
    Sarfo-Kantanka, Godwin
    Baiden, Godwill Enchill
    Dulemordzi, Bernice Akusika
    [J]. JOURNAL OF SENSORS, 2022, 2022
  • [3] QoS Based Evaluation of Routing Protocols in WSN
    Kaur, Bhupinder
    Kaushal, Sakshi
    [J]. 2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [4] PERFORMANCE EVALUATION OF THREE MANET PROTOCOLS ON WSN
    Sigiuk, Hasein Issa
    Ihbeel, Ali A. S.
    [J]. 2012 MOSHARAKA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, COMPUTERS AND APPLICATIONS (MIC-CCA), 2012, : 12 - 17
  • [5] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    [J]. 2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [6] Security Protocols for Internet of Things: A Survey
    Deshmukh, Snehal
    Sonavane, S. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 71 - 74
  • [7] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [8] A Survey of Data Aggregation Protocols for Energy Conservation in WSN and IoT
    Begum, Beneyaz Ara
    Nandury, Satyanarayana, V
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] Performance Evaluation of the Network Lifetime for Routing Protocols in WSN
    Senouci, Mustapha Reda
    Mellouk, Abdelhamid
    Aissani, Amar
    Senouci, Hadj
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 2162 - 2167
  • [10] A Survey of Security and Privacy Issues in ePassport Protocols
    Avoine, Gildas
    Beaujeant, Antonin
    Hernandez-Castro, Julio
    Demay, Louis
    Teuwen, Philippe
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (03)