15
Martin Passing and Falko Dressler - 2006.

Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

  • Upload
    nqdinh

  • View
    60

  • Download
    2

Embed Size (px)

DESCRIPTION

sensor node, security, wsn, cryptographic

Citation preview

Page 1: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

Martin Passing and Falko Dressler - 2006.

Page 2: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

Implement well-know cryptographic algorithm in a hardware sensor node

To check their running time on low-hardware

Algorithm

MD5

SHA-1

AES

1/7/2010 2

Page 3: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

Security solution and architectures.

Implementation

• Hardware

• Software

• Method

Results

Conclusions

1/7/2010 3

Page 4: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

1. Security solution & architecture Primary requirements on a successful security

architecture:

Availability

Authentication

Data confidentiality

Integrity

Non-repudiation

4

Page 5: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

1. Security solution & architecture Effects of a security method to sensor nodes:

That of primary requirements (Slide 4).

Life time: some methods consume more energy to operate than others.

Operation time: especially with low-hardware of sensor nodes.

1/7/2010 5

Page 6: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

1. Security solution & architecture Most of proposed security solutions for WSN

Are copied and adapted

From well-know approaches from Internet-based tech.

New idea?

Not yet outlined the feasibility*

6* SPINS: security protocols for sensor networks, ADRIANPERRIG at al., 2002

Page 7: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

2. Implementation Hardware

Btnode sensor node

NutOS

Atmega 128L

Chipcon CC1000 low power radio

Bluetooth.

Connect to PC.

1/7/2010 7

Page 8: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

2. Implementation Cryptographic algorithms: MD5 (*) produces a 128-bit hash value

MD5("The quick brown fox jumps over the lazy dog") = 9e107d9d372bb6826bd81d3542a419d6

SHA-1 (*) produces a 160-bit digestSHA1("The quick brown fox jumps over the lazy dog") = 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12

AES (**) is the newest, work with fix data size of 128-bit

Cause De facto standards in current security architectures

There are open sources

8

mp5deep, version 3.5.1 http://md5deep.sourceforge.net/http://csrc.nist.gov/archive/aes/index.html

Page 9: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

2. Implementation Main function of test setup

Perform 5 tests:

1/7/2010 9

1. Hashing/encrypting data arrays – size up to 1kb with MD5/SHA-1/AES

2. Hashing/encrypting data array of 1kb with MD5/SHA-1/AES while ChipconCC1000-Enabled/idle-Enabled/receiving message-Disable.

3. Hashing array of different size with MD5 while Chipcon CC1000 is enabled, idled.

4. Hashing 1kb with MD5 while measuring battery voltage.

5. Hashing 1kb with MD5 while using Bluetooth.

Page 10: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

3. Results1. Hashing/encrypting data arrays – size up to 1kb with

MD5/SHA-1/AES

1/7/2010 10

Fig 1. Hashing arrays of different size with MD5 and SHA-1

Fig 2. Hashing arrays of differentsize with AES

Page 11: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

3. Results2. Hashing/encrypting data array of 1kb with MD5/SHA-

1/AES while using Chipcon CC1000.

1/7/2010 11

Fig 3. Hashing 1024 byte of data with MD5 while using Chipcon radio

Fig 5. Hashing 1024 byte of data with AES while using Chipcon radio

Fig 4. Hashing 1024 byte of data with SHA-1 while using Chipcon radio

Page 12: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

3. Results3. Hashing array of different size with MD5 while

Chipcon CC1000 is enabled, idled.

1/7/2010 12

Fig 7. Hashing array of difference size with MD5 while Chipcon radio is idle

Page 13: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

3. Results4. Hashing 1kb with MD5 while measuring battery

voltage.

1/7/2010 13

Fig 8. Hashing array of difference size with MD5 while measuring the battery voltage

Page 14: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

3. Results5. Hashing 1kb with MD5 while using Bluetooth.

1/7/2010 14

Fig 9. Hashing 1024 byte of data with AES while sending data via the Bluetooth system.

Page 15: Experimental Performance Evaluation of Cryptographic Algorithm on Sensor

4. Conclusions The paper produced statistical results by measure

implementations.

Analyzed cryptographies consume remarkable execution time (AES on 1kb consume 1.67s). Network operation needs multi-operation total consume time??

Those statistics could be used for our validation when implementation or calibrate a simulation program.

1/7/2010 15