Paper
28 May 2013 Virtual platform for power and security analysis of wireless sensor network
A. Diaz., J. Gonzalez-Bayon, P. González de Aledo Marugán, P. Sanchez
Author Affiliations +
Proceedings Volume 8764, VLSI Circuits and Systems VI; 87640I (2013) https://doi.org/10.1117/12.2019253
Event: SPIE Microtechnologies, 2013, Grenoble, France
Abstract
Wireless Sensor Networks (WSNs) include low-power and low-cost devices (nodes) with demanding power requirements (long autonomous lifetime). The nodes have to use the available battery carefully and avoid expensive computations or radio transmissions. Therefore, effective simulation mechanisms that allow the developer to obtain estimations at the early stages of the WSN design, prior to deployment, are necessary. Power consumption is not the only important concern in this design but security is becoming a real problem too, since some WSNs process sensitive data. Thus, it is necessary to ensure that the processed data are tamper-proof. This paper proposes a framework for network simulation and embedded SW performance analysis that focuses not only on time and power estimation but also on two new metrics: the “entropy security-oriented metric” provides information about the security encryption used in WSN transmissions and the “heterogeneity metric” provides information to help avoid “replication attacks”. All this information will aid in the whole WSN deployment design, providing useful metrics about power and security.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
A. Diaz., J. Gonzalez-Bayon, P. González de Aledo Marugán, and P. Sanchez "Virtual platform for power and security analysis of wireless sensor network", Proc. SPIE 8764, VLSI Circuits and Systems VI, 87640I (28 May 2013); https://doi.org/10.1117/12.2019253
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensor networks

Computer security

Network security

Information security

Data processing

Cryptography

Network architectures

RELATED CONTENT

Elliptic curve cryptography
Proceedings of SPIE (April 22 2022)
A MAC layer analysis of an impersonation attack in a...
Proceedings of SPIE (June 13 2023)
Scalable architecture for VoIP privacy
Proceedings of SPIE (July 25 2001)
Key distribution for a MLS network architecture
Proceedings of SPIE (November 17 2000)

Back to Top