Evaluation of overheads in security mechanisms in wireless sensor networks

Tanveer Zia, Albert Zomaya, Nedal Ababneh

Research output: Book chapter/Published conference paperConference paperpeer-review

12 Citations (Scopus)
43 Downloads (Pure)

Abstract

Wireless sensor networks are being used in many commercial and military applications to collect real time and event driven data. Deployment nature of sensor networks makes them vulnerable to security threats. Due to the resource limitations traditional security measures are not enough to protect sensor nodes. Research in sensor network security domains has produced several security solutions. In this paper we have observed three recently introduced security mechanisms (1) TinySec (2) MiniSec, and (3) TripleKeys. We have studied these security mechanisms in terms of packet overheads and compared the packet transmission time, average latency and energy consumption. Our comparison shows that the packet overheads in TripleKeys are lesser compared to other two schemes. We have then used the 38 bytes packet size of TripleKeys for further analysis and calculated the packet delivery ratio, latency and energy consumption. We have observed that packet delivery ratio decreases when we increase the number of nodes while latency and energy increases.
Original languageEnglish
Title of host publicationSENSORCOMM 2007
Subtitle of host publicationProceedings of the 2007 International Conference on Sensor Technologies and Applications
EditorsJamie Lloret Mauri
Place of PublicationIEEECS Headquarters Washington, DC
PublisherIEEE Computer Society Press
Pages181-185
Number of pages5
ISBN (Electronic)0769529887
Publication statusPublished - 2007
EventInternational Conference on Sensor Technologies and Applications - Valencia, Spain, Spain
Duration: 14 Oct 200720 Oct 2007

Conference

ConferenceInternational Conference on Sensor Technologies and Applications
Country/TerritorySpain
Period14/10/0720/10/07

Fingerprint

Dive into the research topics of 'Evaluation of overheads in security mechanisms in wireless sensor networks'. Together they form a unique fingerprint.

Cite this