Scholarly Research Excellence

Digital Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29122


Select areas to restrict search in scientific publication database:
10008451
The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.
Digital Object Identifier (DOI):

References:

[1] Y. Zhong, L. Cheng, L. Zhang, Y. Song, and H. R. Karimi, “Energy-efficient routing control algorithm in large-scale wsn for water environment monitoring with application to three gorges reservoir area,” The Scientific World Journal, vol. 2014, 2014.
[2] M. Turkanovi´c, B. Brumen, and M. H¨olbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, sep 2014. (Online). Available: http://linkinghub.elsevier.com/retrieve/pii/S157087051400064X
[3] L. D. Xu, W. He, and S. Li, “Internet of things in industries: A survey,” IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233–2243, 2014.
[4] M. Elshrkawey, S. M. Elsherif, and M. E. Wahed, “An enhancement approach for reducing the energy consumption in wireless sensor networks,” Journal of King Saud University-Computer and Information Sciences, 2017.
[5] Z. Jiang and Y. Pan, From Problem to Solution: Wireless Sensor Networks Security. Commack, NY, USA: Nova Science Publishers, Inc., 2009.
[6] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
[7] M. K. Jain, “Wireless sensor networks: Security issues and challenges,” International Journal of Computer and Information Technology, vol. 2, no. 1, pp. 62–67, 2011.
[8] D. K. G., M. K. Singh, and M. Jayanthi, Eds., Network Security Attacks and Countermeasures. IGI Global, 2016. (Online). Available: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1 -4666-8761-5
[9] S. B. Othman, A. A. Bahattab, A. Trad, and H. Youssef, “Confidentiality and integrity for data aggregation in wsn using homomorphic encryption,” Wireless Personal Communications, vol. 80, no. 2, pp. 867–889, 2015.
[10] H. Modares, R. Salleh, and A. Moravejosharieh, “Overview of security issues in wireless sensor networks,” in Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on. IEEE, 2011, pp. 308–311.
[11] S. Sciancalepore, G. Piro, E. Vogli, G. Boggia, and L. A. Grieco, “On securing ieee 802.15. 4 networks through a standard compliant framework,” in Euro Med Telco Conference (EMTC), 2014. IEEE, 2014, pp. 1–6.
[12] S. B. Othman, A. Trad, and H. Youssef, “Performance evaluation of encryption algorithm for wireless sensor networks,” in Information Technology and e-Services (ICITeS), 2012 International Conference on. IEEE, 2012, pp. 1–8.
[13] A. Trad, A. A. Bahattab, and S. B. Othman, “Performance trade-offs of encryption algorithms for wireless sensor networks,” in Computer Applications and Information Systems (WCCAIS), 2014 World Congress on. IEEE, 2014, pp. 1–6.
[14] C. Panait and D. Dragomir, “Measuring the performance and energy consumption of aes in wireless sensor networks,” in Computer Science and Information Systems (FedCSIS), 2015 Federated Conference on. IEEE, 2015, pp. 1261–1266.
[15] J. Lee, K. Kapitanova, and S. H. Son, “The price of security in wireless sensor networks,” Computer Networks, vol. 54, no. 17, pp. 2967–2978, 2010.
[16] A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, “Powertrace: Network-level power profiling for low-power wireless networks,” 2011.
[17] A. V. Taddeo, M. Mura, and A. Ferrante, “Qos and security in energy-harvesting wireless sensor networks,” in Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on. IEEE, 2010, pp. 1–10.
[18] J. Misic and V. Misic, Wireless personal area networks: Performance, interconnection, and security with IEEE 802.15. 4. John Wiley & Sons, 2008, vol. 1.
[19] A. Dunkels, “The ContikiMAC Radio Duty Cycling Protocol,” SICS, Tech. Rep., 2011. (Online). Available: http://soda.swedish-ict.se/5128/1/contikimac-report.pdf
[20] “Moteiv Corporation. SkyTmote Datasheet,” 2006, (Online Document) Available: http://www.eecs.harvard.edu/ konrad/projects/shimmer/references/tmotesky- datasheet.pdf.

Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007