X Xiong
Power optimization for wireless sensor networks security based on an FPGA implementation
Xiong, X
Authors
Contributors
SL Hill S.L.Hill@salford.ac.uk
Supervisor
Abstract
Security is a key consideration when deploying Wireless Sensor Networks (WSNs). Due to the constrained hardware resources in sensor network nodes, lightweight cryptographic primitives are often implemented for fast execution and small memory usage. Apart from the computational complexity of cryptographic algorithms, the technique of implementing them in practical terms is another crucial aspect in WSN security development, which directly reflects to the power efficiency. Since the battery life confines the lifetime of a sensor node, energy conservation is normally set as the first priority in developing security solution. This means that the optimal security operation for WSNs has to consume the smallest amount of energy possible while it is active.
A novel power optimization methodology is proposed intended to provide a guideline to evaluate cryptographic primitives and implementation techniques for constructing the power optimal security solution. Noting the inevitable limitations of traditional security implementation techniques, a FPGA-based hybrid technique was innovated to offer high efficiency with flexibility. An interesting impact of the operating frequency on the power consumption in security development was also identified.
Using this methodology, the most suitable cryptographic primitive and hardware implementation configurations were suggested for building environment monitoring application from procedural experiments. This produced an optimal security solution that proved the feasibility and effectiveness of the proposed methodology as its actual measurements fully satisfied the predetermined criteria. The outcome showed that the FPGA implementation technique was the most power efficient implementation solution for flexibility-essential applications and the adjustment of operating frequency could be a useful tool to further optimize the security solution for low power.
Thesis Type | Thesis |
---|---|
Deposit Date | Oct 3, 2012 |
Award Date | Jan 1, 2009 |
This file is under embargo due to copyright reasons.
Contact Library-ThesesRequest@salford.ac.uk to request a copy for personal use.
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search