Why is IPSec a viable option for wireless sensor networks
- 1 September 2008
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Many issues still remain to be addressed in order to achieve acceptable security in wireless sensor networks (WSNs). This necessity, together with the adoption of IPv6 on WSNs being defined at the 6lowpan working group of the IETF, motivates our investigation on the feasibility of the application of IPSec on sensor nodes. IPSec is already part of IPv6, which makes it a natural candidate to be directly employed or adapted for WSNs. We discuss results obtained from practical experiments on the usage of cryptographic algorithms typically employed within IPSec in real sensor nodes. We analyze the security and performance tradeoffs involved when employing cryptography measures in WSNs, also in the context of their usage side-by-side with IPv6. The results obtained show that the adoption of a security architecture such as IPSec is viable, and also point towards the successful design and deployment of a security architecture for WSNs.Keywords
This publication has 11 references indexed in Scilit:
- A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network NodesMobile Networks and Applications, 2007
- IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals2007
- Experimental Performance Evaluation of Cryptographic Algorithms on Sensor NodesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Wormhole attacks in wireless networksIEEE Journal on Selected Areas in Communications, 2006
- Investigation of feasible cryptographic algorithms for wireless sensor networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Evaluation of Security Mechanisms in Wireless Sensor NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Simulating the power consumption of large-scale sensor network applicationsPublished by Association for Computing Machinery (ACM) ,2004
- An integrated data-link energy model for wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Secure routing in wireless sensor networks: attacks and countermeasuresAd Hoc Networks, 2003
- Denial of service in sensor networksComputer, 2002