skip to main content
10.1145/1229285.1229334acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

The energy cost of cryptographic key establishment in wireless sensor networks

Published: 20 March 2007 Publication History

Abstract

Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and secure techniques for setting up a shared secret key between sensor nodes is a challenging task. In this paper we analyze and compare the energy cost of two different protocols for authenticated key establishment. The first protocol employs a lightweight variant of the Kerberos key transport mechanism with 128-bit AES encryption. The second protocol is based on ECMQV, an authenticated version of the elliptic curve Diffie-Hellman key exchange, and uses a 256-bit prime field GF(p) as underlying algebraic structure. We evaluate the energy cost of both protocols on a Rockwell WINS node equipped with a 133 MHz Strong ARM processor and a 100 kbit/s radio module. The evaluation considers both the processor's energy consumption for calculating cryptographic primitives and the energy cost of radio communication for different transmit power levels. Our simulation results show that the ECMQV key exchange consumes up to twice as much energy as Kerberos-like key transport.

References

[1]
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Network Security. Technical Report #00-010, Network Associates Inc., 2000.]]
[2]
H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM 2005), vol. 1, pp. 524--535. IEEE, 2005.]]
[3]
L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 41--47. ACM Press, 2002.]]
[4]
J. Großschädl, A. Szekely, and S. Tillich. The energy cost of cryptographic key establishment in wireless sensor networks. Cryptology ePrint Archive, Report 2007/003. Available for download at http://eprint.iacr.org, 2007.]]
[5]
D. Hankerson, A. J. Menezes, and S. A. Vanstone. Guide to Elliptic Curve Cryptography. Springer Verlag, 2004.]]
[6]
A. Hodjat and I. Verbauwhede. The energy cost of secrets in ad-hoc networks. In Proceedings of the 5th Workshop on Wireless Communications and Networking. IEEE, 2002.]]
[7]
J. T. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (Version 5). Internet Engineering Task Force (IETF), Internet Draft RFC 1510, Sept. 1993.]]
[8]
L. E. Law et al. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography, 28(2):119--134, Mar. 2003.]]
[9]
A. Perrig et al. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 189--199. ACM Press, 2001.]]
[10]
V. Raghunathan, C. Schurgers, S. Park, and M. B. Srivastava. Energy-aware wireless microsensor networks. IEEE Signal Processing Magazine, 19(2):40--50, Mar. 2002.]]

Cited By

View all
  • (2024)Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of ThingsArabian Journal for Science and Engineering10.1007/s13369-024-08884-z49:9(12919-12934)Online publication date: 22-Mar-2024
  • (2022)Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security ApplicationsIEEE Access10.1109/ACCESS.2022.319297010(76707-76719)Online publication date: 2022
  • (2021)Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN2021 18th International Conference on Privacy, Security and Trust (PST)10.1109/PST52912.2021.9647741(1-7)Online publication date: 13-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
March 2007
323 pages
ISBN:1595935746
DOI:10.1145/1229285
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. energy evaluation
  3. key establishment
  4. security protocols
  5. wireless networking

Qualifiers

  • Article

Conference

Asia CCS07
Sponsor:

Acceptance Rates

ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of ThingsArabian Journal for Science and Engineering10.1007/s13369-024-08884-z49:9(12919-12934)Online publication date: 22-Mar-2024
  • (2022)Comparative Analysis of Energy Costs of Asymmetric vs Symmetric Encryption-Based Security ApplicationsIEEE Access10.1109/ACCESS.2022.319297010(76707-76719)Online publication date: 2022
  • (2021)Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN2021 18th International Conference on Privacy, Security and Trust (PST)10.1109/PST52912.2021.9647741(1-7)Online publication date: 13-Dec-2021
  • (2021)LCDAComputers and Security10.1016/j.cose.2021.102351108:COnline publication date: 1-Sep-2021
  • (2021)In-depth energy analysis of security algorithms and protocols for the Internet of ThingsJournal of Cryptographic Engineering10.1007/s13389-021-00274-712:2(137-149)Online publication date: 24-Nov-2021
  • (2021)Challenges and Developments in Secure Routing Protocols for Healthcare in WBAN: A Comparative AnalysisWireless Personal Communications10.1007/s11277-021-08969-0Online publication date: 22-Aug-2021
  • (2020)Internet of Things-Based Authentication Mechanism for E-Health ApplicationsIncorporating the Internet of Things in Healthcare Applications and Wearable Devices10.4018/978-1-7998-1090-2.ch007(122-136)Online publication date: 2020
  • (2020)A node to node security for sensor nodes implanted in cross cover multi-layer architecture using Mc-Nie algorithmEvolutionary Intelligence10.1007/s12065-020-00478-6Online publication date: 5-Sep-2020
  • (2019)Cryptography in WSNsMission-Oriented Sensor Networks and Systems: Art and Science10.1007/978-3-319-91146-5_21(783-820)Online publication date: 19-Sep-2019
  • (2019)A Power Efficient Authentication Model for E-Healthcare System Security Concerns in Context to Internet of Things (IoT)Handbuch Medien und Geschlecht10.1007/978-3-030-19813-8_23(225-233)Online publication date: 10-May-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media