PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper we examine the influence of different types of encryption and authentication on the quality of transmitted data in the high-performance WSN based on Imote2. The performance has been tested in the wireless sensor network using Collection Tree Protocol. The examined types and modes of encryption are provided by the hardware of used sensor platforms Intelmote2 and its integrated radio chip CC2420. The presented results can be helpful to choose which cryptographic modules should be implemented according to the acceptable packet loss.
Rocznik
Strony
117--127
Opis fizyczny
Bibliogr. 11 poz., rys., tab.
Twórcy
autor
  • Institute of Computer Science, Maria Curie-Sklodowska University, pl. M. Curie-Sklodowskiej 1, 20-031 Lublin, Poland
  • Institute of Computer Science, Maria Curie-Sklodowska University, pl. M. Curie-Sklodowskiej 1, 20-031 Lublin, Poland
Bibliografia
  • [1] Fonseca R., Gnawali O., Jamieson K., Kim S., Levis P., Woo A., The Collection Tree Protocol; http://www.tinyos.net/tinyos-2.x/doc/html/tep123.html (2007)
  • [2] TinyOS; http://www.tinyos.net (2010)
  • [3] Rice, J. A. and Spencer Jr., B. F., Structural health monitoring sensor development for the Imote2 platform, Proc. SPIE Smart Structures/NDE. (2008)
  • [4] Virone G., Wood A., Selavo L., Cao Q., Fang L., Doan T., He Z., Stankovic J., An advanced wireless sensor network for health monitoring, In Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2) (2006)
  • [5] Gao T., Pesto C., Selavo L., Chen Y., Ko J., Kim J., Terzis A., Watt A., Jeng J., Chen B., Lorincz K., Welsh M., Wireless medical sensor networks in emergency response: Implementation and pilot results, In HST Waltham, MA, USA (2008)
  • [6] Intelmote2 (IPR 2400), http://www.xbow.com.cn/LinkClick.aspx?fileticket=i7FK6%2B1oodU%3D&tabid=121 (2007)
  • [7] CC2420, http://focus.ti.com/lit/ds/symlink/cc2420.pdf (2010)
  • [8] Rusinek D., Księżopolski B., Kotulski Z., On effect of the communication factors on the protocol’s goal availability service in high performance real-time Wireless Sensor Networks, (In Polish), Studia Informatica 32(3A(98)) (2011): 187.
  • [9] SJTU CIS Lab., The standalone aes encryption of CC2420, http://cis.sjtu.edu.cn/index.php/The Standalone AES Encryption of CC2420 (TinyOS 2.10 and MICAz) (2008)
  • [10] Księżopolski B., Kotulski Z., Adaptable security mechanism for the dynamic environments. Computers & Security 26 (2007): 246.
  • [11] Księżopolski B., Kotulski Z., Szalachowski P., Adaptive approach to network security. Communications in Computer and Information Science 158 (2009): 233.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e873a248-2cae-419d-975a-916537179252
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.