Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.8.077

Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations  

Kim, Hyun-Gon (Dept. of Information Security, Mokpo National University)
Abstract
In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.
Keywords
6LoWPAN; Fragmentation; Re-assemble; Securty; Confidentiality;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Thubert, J. Hui, "LoWPAN Fragment Fowarding and Recovery, "IETF draft draft-thubert-6lowpa n-simple-frag ment-recovery-07.txt, June 2010.
2 Wiki page of 6LoWPAN, http://smote.cs.berkeley.edu:8000/t racenv/wiki/b6loWPAN, the wiki-site of 6LoWPAN.
3 Hui, J. W. and Culler, D. E., "IP is dead, long live IP for wireless sensor networks, "In Proceeding of the 6th ACM Conference on Embedded Network Sensor Systems, pp.15-28, Nov. 2008.
4 http://sics.se/projects/sicslowpan
5 Wei Liu, Rong Luo, Huazhong Yang, "Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks, "WRI International Conference on Communications and Mobile Computing, vol. 3, pp.496-501, 2009.
6 P. Ganesan, R. Venugopalan etc., "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes, "WSNA 03, Sept. 2003.
7 R. Venugopalan, P. Ganesan etc., "Encryption Ove rhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis, "CASES, pp.188-197, Oct. 2003.
8 R. Silva, J. S. Silva, F. Boavida, "Evaluating 6Lo WPAN Implementations in WSNs, "In Proceeding of the 9th Conference on Computer Networks, pp.15-16, Oct. 2009.
9 J. Granjal, R. Silva, E. Monteiro, J. Silva, F. Boav ida, "Why is IPSec a viable option for Wireless Sensor Networks, "Proceedings of WSNS 2008, pp.802-807, Sept. 2008.
10 G G. Montenegro, N. Kushalnager, etc,. "Transmis sion of IPv6 Packets over IEEE 802.15.4 Networks, "IETF RFC4944, Sept. 2007.
11 IETF, "IPv6 over Low power WPAN(6LowPAN), " http://www.ietf.org
12 IEEE, "IEEE std. 802.15.4-2003, "IEEE Computer Society, Oct. 2003.
13 IEEE, "802.15.4Wireless MediumAccess Control (MAC) and Physical Layer(PHY) Specifications for Low-Rate Wireless Personal Area Networks (LRWPANs), "IEEE Computer Society, September 2003.
14 S. Diniel Park, K. Kim, E. Seo, S. Charkrabarti, "IPv6 over Low Power WPAN Security Analysis, "IETF draft-danie -6lowpan-security- analysis-02 .txt, June 2006.
15 G. P. Chandranmenon and G. Varghese, "Reconsid ering fragmentation and reassembly, "17th ACM SIGACT -SIG OPS Symposiumon Priciples of Distrubuted Computing, 1998.
16 HyunGon Kim, "A Secure 6LoWPAN Re-transmission Mec hanism for Packet Fragmentation against Replay Attacks, "Korea Society of Computer Information, Vol. 14, pp.101-110, Oct. 2009.