experimental performance evaluation of cryptographic algorithm on sensor
DESCRIPTION
sensor node, security, wsn, cryptographicTRANSCRIPT
![Page 1: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/1.jpg)
Martin Passing and Falko Dressler - 2006.
![Page 2: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/2.jpg)
Implement well-know cryptographic algorithm in a hardware sensor node
To check their running time on low-hardware
Algorithm
MD5
SHA-1
AES
1/7/2010 2
![Page 3: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/3.jpg)
Security solution and architectures.
Implementation
• Hardware
• Software
• Method
Results
Conclusions
1/7/2010 3
![Page 4: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/4.jpg)
1. Security solution & architecture Primary requirements on a successful security
architecture:
Availability
Authentication
Data confidentiality
Integrity
Non-repudiation
4
![Page 5: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/5.jpg)
1. Security solution & architecture Effects of a security method to sensor nodes:
That of primary requirements (Slide 4).
Life time: some methods consume more energy to operate than others.
Operation time: especially with low-hardware of sensor nodes.
1/7/2010 5
![Page 6: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/6.jpg)
1. Security solution & architecture Most of proposed security solutions for WSN
Are copied and adapted
From well-know approaches from Internet-based tech.
New idea?
Not yet outlined the feasibility*
6* SPINS: security protocols for sensor networks, ADRIANPERRIG at al., 2002
![Page 7: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/7.jpg)
2. Implementation Hardware
Btnode sensor node
NutOS
Atmega 128L
Chipcon CC1000 low power radio
Bluetooth.
Connect to PC.
1/7/2010 7
![Page 8: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/8.jpg)
2. Implementation Cryptographic algorithms: MD5 (*) produces a 128-bit hash value
MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6
SHA-1 (*) produces a 160-bit digestSHA1("The quick brown fox jumps over the lazy dog") = 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12
AES (**) is the newest, work with fix data size of 128-bit
Cause De facto standards in current security architectures
There are open sources
8
mp5deep, version 3.5.1 http://md5deep.sourceforge.net/http://csrc.nist.gov/archive/aes/index.html
![Page 9: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/9.jpg)
2. Implementation Main function of test setup
Perform 5 tests:
1/7/2010 9
1. Hashing/encrypting data arrays – size up to 1kb with MD5/SHA-1/AES
2. Hashing/encrypting data array of 1kb with MD5/SHA-1/AES while ChipconCC1000-Enabled/idle-Enabled/receiving message-Disable.
3. Hashing array of different size with MD5 while Chipcon CC1000 is enabled, idled.
4. Hashing 1kb with MD5 while measuring battery voltage.
5. Hashing 1kb with MD5 while using Bluetooth.
![Page 10: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/10.jpg)
3. Results1. Hashing/encrypting data arrays – size up to 1kb with
MD5/SHA-1/AES
1/7/2010 10
Fig 1. Hashing arrays of different size with MD5 and SHA-1
Fig 2. Hashing arrays of differentsize with AES
![Page 11: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/11.jpg)
3. Results2. Hashing/encrypting data array of 1kb with MD5/SHA-
1/AES while using Chipcon CC1000.
1/7/2010 11
Fig 3. Hashing 1024 byte of data with MD5 while using Chipcon radio
Fig 5. Hashing 1024 byte of data with AES while using Chipcon radio
Fig 4. Hashing 1024 byte of data with SHA-1 while using Chipcon radio
![Page 12: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/12.jpg)
3. Results3. Hashing array of different size with MD5 while
Chipcon CC1000 is enabled, idled.
1/7/2010 12
Fig 7. Hashing array of difference size with MD5 while Chipcon radio is idle
![Page 13: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/13.jpg)
3. Results4. Hashing 1kb with MD5 while measuring battery
voltage.
1/7/2010 13
Fig 8. Hashing array of difference size with MD5 while measuring the battery voltage
![Page 14: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/14.jpg)
3. Results5. Hashing 1kb with MD5 while using Bluetooth.
1/7/2010 14
Fig 9. Hashing 1024 byte of data with AES while sending data via the Bluetooth system.
![Page 15: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor](https://reader034.vdocuments.mx/reader034/viewer/2022052411/5571f39e49795947648e5383/html5/thumbnails/15.jpg)
4. Conclusions The paper produced statistical results by measure
implementations.
Analyzed cryptographies consume remarkable execution time (AES on 1kb consume 1.67s). Network operation needs multi-operation total consume time??
Those statistics could be used for our validation when implementation or calibrate a simulation program.
1/7/2010 15