CFP last date
20 May 2024
Reseach Article

Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks

by Henry Nunoo-mensah, Kwame Osei Boateng, James Dzisi Gadze
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 11
Year of Publication: 2015
Authors: Henry Nunoo-mensah, Kwame Osei Boateng, James Dzisi Gadze
10.5120/19233-0968

Henry Nunoo-mensah, Kwame Osei Boateng, James Dzisi Gadze . Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks. International Journal of Computer Applications. 109, 11 ( January 2015), 20-23. DOI=10.5120/19233-0968

@article{ 10.5120/19233-0968,
author = { Henry Nunoo-mensah, Kwame Osei Boateng, James Dzisi Gadze },
title = { Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 11 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number11/19233-0968/ },
doi = { 10.5120/19233-0968 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:31.875636+05:30
%A Henry Nunoo-mensah
%A Kwame Osei Boateng
%A James Dzisi Gadze
%T Comparative Analysis of Energy Usage of Hash Functions in Secured Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 11
%P 20-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against node tampering and node subversion. Works carried out by wireless sensor network researchers pertaining to increasing the security of the network is significant. Node authentication is a suitable technique against node tampering and the introduction of false nodes. A way of authenticating nodes is by using Message Authentication Code (MAC); this is implemented using hash functions. The limited energy available to sensor nodes, have to be considered when selecting a hash function for implementation. In this paper, comparative analysis of some hash functions (MD-5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512) were carried out. The functions were selected based on their popularity. The analysis was done to identify a short-list of hash functions that can be used when WSN hash related security techniques are being designed. The short-listed functions so identified were further analyzed in terms of their complexities. This was carried out by executing compiled codes and averaging the CPU time spent in executing a common scenario. The result of the analyses showed SHA-224 as the best hash function to be used when designing energy-conscious secured WSNs.

References
  1. A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, vol. 35, pp. 53–57, 2002.
  2. X. Du and H. Chen, "Security in Wireless Sensor Networks," IEEE Wireless Communications, pp. 60-66, August 2008.
  3. A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography. CRC Press Inc, 1997.
  4. J. Deng, R. Han, and S. Mishra, "INSENS: Intrusion-tolerant routing in wireless sensor networks," Technical Report CU-CS-939- 02, Department of Computer Science, University of Colorado at Boulder, November 2002.
  5. W. Du, R. Wang, and P. Ning, "An efficient scheme for authenticating public keys in sensor networks," In Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing, New York, ACM Press, 2005, pp. 58-67.
  6. O. Delgado-Mohatar, A. Fúster-Sabater, J. M. Sierra, "A light-weight authentication scheme for wireless sensor networks," Ad Hoc Networks, Vol. 9, No. 5, Jul. 2011, pp. 727-735
  7. X. Wang, D. Feng, X. Lai and H. Yu, "Collisions for Hash Functions," in Crypto, 2004
  8. A. A. Putri Ratna, P. D. Purnamasari, A. Shaugi and M. Salman, "Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system," Int. Conf. on QiR (Quality in Research), pp. 99-104, Jun. 2013
  9. Description of SHA-256, SHA-384, SHA-512, Available at:http://csrc. nist. gov/groups/STM/cavp/documents/shs/sha256-384-512. pdf
  10. C. Karlof, N. Sastry and D. Wagner, "TinySec: A link layer Security Architecture for Wireless Sensor Networks," 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys) '04, pp. 162– 175, Nov. 2004
Index Terms

Computer Science
Information Sciences

Keywords

Hash Functions Wireless Sensor Network Security Execution time Complexity SHA-224 SHA-1 Analysis