Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limita...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/15398/ http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf |
id |
iium-15398 |
---|---|
recordtype |
eprints |
spelling |
iium-153982012-02-02T06:54:08Z http://irep.iium.edu.my/15398/ Comparison between RSA hardware and software implementation for WSNs sexcurity schemes Md. Tap, Abu Osman Manttoro, Teddy Alkalbani, Abdullah Said T Technology (General) The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf Md. Tap, Abu Osman and Manttoro, Teddy and Alkalbani, Abdullah Said (2010) Comparison between RSA hardware and software implementation for WSNs sexcurity schemes. In: Proceedings 3rd International Conference on OCT4M 2010, December 2010, Jakarta, Indonesia. |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Md. Tap, Abu Osman Manttoro, Teddy Alkalbani, Abdullah Said Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
description |
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security. |
format |
Conference or Workshop Item |
author |
Md. Tap, Abu Osman Manttoro, Teddy Alkalbani, Abdullah Said |
author_facet |
Md. Tap, Abu Osman Manttoro, Teddy Alkalbani, Abdullah Said |
author_sort |
Md. Tap, Abu Osman |
title |
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
title_short |
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
title_full |
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
title_fullStr |
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
title_full_unstemmed |
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes |
title_sort |
comparison between rsa hardware and software implementation for wsns sexcurity schemes |
publishDate |
2010 |
url |
http://irep.iium.edu.my/15398/ http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf |
first_indexed |
2023-09-18T20:24:24Z |
last_indexed |
2023-09-18T20:24:24Z |
_version_ |
1777408320263421952 |