Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.3.586

On Dynamic Voltage Scale based Protocol for Low Power Underwater Secure Communication on Sensor Network  

Seo, Hwa-Jeong (Department of Computer Engineering, Pusan National University)
Kim, Ho-Won (Department of Computer Engineering, Pusan National University)
Abstract
Maximizing the operating time by reducing the power consumption is important factor to operate sensor network under water networks. For efficient power consumption, dynamic voltage scaling method is available. This method operates low frequency when there is no workload. In case of abundant workload, high frequency operation completes hard work within short time, reducing power consumption. For this reason, complex cryptography should be computed in high frequency. In this paper, we apply dynamic voltage scaling method to cryptography and show performance evaluation. With this result, we can reduce power consumption for cryptography in under water communication.
Keywords
Underwater Communication; Low Power; Dynamic Voltage Scaling; Embedded System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, "Wireless sensor network survey," Computer Networks, 52 , pp. 2292-2330, 2008   DOI   ScienceOn
2 Ye, Wei, John Heidemann, and Deborah Estrin. "An energy-efficient MAC protocol for wireless sensor networks." In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1567-1576, 2002
3 Polastre, Joseph, Jason Hill, and David Culler. "Versatile low power media access for wireless sensor networks." In Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 95-107, 2004
4 M.C. Vuran, I.F. Akyildiz, "Spatial correlation-based collaborative medium access control in wireless sensor networks," IEEE/ACM Transactions on Networking 14, 316-329, 2006   DOI   ScienceOn
5 Koblitz, N. "Elliptic curve cryptosystems". Mathematics of Computation 48, pp. 203-209, 1987   DOI   ScienceOn
6 Miller, V. "Use of elliptic curves in cryptography". CRYPTO 85, pp. 417-426, 1985
7 NIST, "FIPS 180-1" (supereded by FIPS 180-2). See also NIST's Secure Hasing site.
8 OpenSSL Homepage for AES : http://www.openssl.org, 2014
9 Relic Homepage for TinyPBC : https://code.google.com/p/relic-toolkit/, 2014
10 J. Daemen, V. Rijmen, "AES Proposal: Rijndael", 1999
11 National Institute of Standards and Technology (NIST), "FIPS 197: Advanced Encryption Standard (AES)", 2001
12 Information of ATxmega128A1, Available at http://www.atmel.com/devices/atxmega128a1.aspx, 2013
13 Information of ATxmel Studio, Available at http://www.atmel.com/Microsite/atmel_studio6/default.aspx, 2013
14 Information of MSP430F5529, Available at http://www.ti.com/product/msp430f5529, 2013
15 Information of IAR-Embedded Workbench for MSP, Available at http://www.iar.com/, 2013
16 Information of PXA271, Available at http://www.datasheetarchive.com/PXA271-datasheet.html, 2013
17 Goodman, James, Abram P. Dancy, and Anantha P. Chandrakasan. "An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter." Solid-State Circuits, IEEE Journal of 33, no. 11, pp. 1799-1809, 1998   DOI   ScienceOn
18 Dynamic voltage scaling, available in: http://en.wikipedia.org/wiki/Dynamic_voltage_scaling, 2013