By Topic

Energy efficient authentication in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Soderlund, R. ; Linkoping Univ., Linkoping ; Svensson, S. ; Lennvall, T.

The main purpose of this study is to investigate how to provide authentication in wireless sensor networks and how it can be done in an energy efficient way. Other goals are to give an introduction to general security in wireless sensor networks and to see how the addition of message authentication codes (MAC) of various lengths affects the lifetime of a sensor node. To do this, a study of security solutions with focus on key establishment schemes that enable authentication and practical tests on the energy consumption depending on MAC length are performed. The conclusion from the study of security solutions is that symmetric cryptography is to prefer over public key cryptography.

Published in:

Emerging Technologies and Factory Automation, 2007. ETFA. IEEE Conference on

Date of Conference:

25-28 Sept. 2007