loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Manuel Koschuch ; Matthias Hudler and Michael Krüger

Affiliation: University of Applied Science, Austria

ISBN: 978-989-8565-23-5

Keyword(s): Efficient Implementation, Hash Algorithms, Sensor Networks, Sensor Nodes, SHA-1, SHA-3, Tiger Hash.

Related Ontology Subjects/Areas/Topics: Data Communication Networking ; Implementation and Experimental Test-Beds ; Performance Evaluation ; Sensor Nets and Embedded Systems ; Software Engineering ; Software Project Management ; Telecommunications

Abstract: Wireless Sensors Networks are still an emerging technology. Their special architecture allows for unique applications that would be impossible, or at least very difficult, to implement using other technologies. But the wireless data transmission between the single nodes poses new challenges from a security point of view: the single messages have to be secured against eavesdropping and manipulation, as well as the individual nodes have to be secured against capture and extraction of their secret key. Cryptographic hash functions are an integral part of most cryptographic network protocols, whether they are used for signatures or message integrity. In this position paper, we describe a preliminary performance evaluation of three very different hash-functions on a Texas Instruments CC2530 sensor node, based on an 8051 microcontroller: Tiger, representing a hash designed for 64-bit architectures, the current standard SHA-1, and Grøstl, a SHA-3 finalist. Our preliminary results indicate th at even without any major optimizations hash algorithms that were clearly not designed to run on constrained devices can be adapted to these environments with quite acceptable results, thereby giving designers of sensor network security protocols new implementation options. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.209.80.87

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Koschuch, M.; Hudler, M. and Krüger, M. (2012). Hash Algorithms for 8051-based Sensornodes.In Proceedings of the International Conference on Data Communication Networking, e-Business and Optical Communication Systems - Volume 1: DCNET, (ICETE 2012) ISBN 978-989-8565-23-5, pages 65-68. DOI: 10.5220/0004062400650068

@conference{dcnet12,
author={Manuel Koschuch. and Matthias Hudler. and Michael Krüger.},
title={Hash Algorithms for 8051-based Sensornodes},
booktitle={Proceedings of the International Conference on Data Communication Networking, e-Business and Optical Communication Systems - Volume 1: DCNET, (ICETE 2012)},
year={2012},
pages={65-68},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004062400650068},
isbn={978-989-8565-23-5},
}

TY - CONF

JO - Proceedings of the International Conference on Data Communication Networking, e-Business and Optical Communication Systems - Volume 1: DCNET, (ICETE 2012)
TI - Hash Algorithms for 8051-based Sensornodes
SN - 978-989-8565-23-5
AU - Koschuch, M.
AU - Hudler, M.
AU - Krüger, M.
PY - 2012
SP - 65
EP - 68
DO - 10.5220/0004062400650068

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.