Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks

12Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Due to the resource constrained environments under which the Wireless Sensor Networks (WSNs) operate, the security protocols and algorithms should be so designed to be used in WSNs, as to yield the optimum performance. The efficiency of the block cipher and the mode under which it operates are vital factors in leveraging the performance of any security protocol. In this paper, therefore, we focus on the issue of optimizing the security vs. performance tradeoff at the link layer framework in WSNs. We evaluate the resource requirements of the block ciphers characteristically distinct from each other, in conventional modes and the Authenticated Encryption (AE) modes. We use the Skipjack cipher in CBC mode, as the basis for comparison. To the best of our knowledge, ours is the first experimental evaluation of the AES cipher, the XXTEA cipher, the OCB mode and the CCM mode at the link layer security architecture for WSNs. © 2008 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Jinwala, D., Patel, D., & Dasgupta, K. (2008). Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5352 LNCS, pp. 258–272). https://doi.org/10.1007/978-3-540-89862-7_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free