Using encryption for authentication: Wireless sensor network case
Authors | |
---|---|
Year of publication | 2013 |
Type | Article in Proceedings |
Conference | 2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN) |
MU Faculty or unit | |
Citation | |
Web | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6603089&tag=1 |
Doi | http://dx.doi.org/10.1109/MWSN.2013.6603089 |
Field | Informatics |
Keywords | Authentication;Encryption;Hardware;Random access memory;Timing;Wireless sensor networks |
Description | In this paper we discuss the possibility of using encryption to provide authenticity and explore various options for using authentication primitives, namely MAC, to provide confidentiality in wireless sensor networks. We briefly discuss the theoretical background and focus more deeply on the performance questions. We have found and implemented a set of both encryption and MAC functions, measured the timings and memory requirements of these on a mainstream wireless sensor node. Our paper also brings a performance analysis of existing cryptographic implementations. |
Related projects: |