• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Security versus Power Consumption in Wireless Sensor Networks

Fötschl, Christine, Rainer, Stefan January 2006 (has links)
<p>X3 C is a Swedish company which develops a world wide good tracking system by using ARFID </p><p>tags placed on every item which has to be delivered and base stations as gateway in a wireless </p><p>sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to </p><p>implement security. Firstly an evaluation of possible security mechanisms and their power </p><p>consumption was done by measuring the avalanche effect and character frequency of the sym- </p><p>metric algorithms Blowfish, RC2 and XTEA. Secondly, the required CPU time which is needed </p><p>by each algorithm for encrypting a demo plaintext, was measured and analyzed. Summariz- </p><p>ing both analysis, the XTEA algorithm, run in CBC mode, is the recommendation for the XC </p><p>ARFID tags. The testing processes and the results are presented in detail in this thesis.</p>
2

Security versus Power Consumption in Wireless Sensor Networks

Fötschl, Christine, Rainer, Stefan January 2006 (has links)
X3 C is a Swedish company which develops a world wide good tracking system by using ARFID tags placed on every item which has to be delivered and base stations as gateway in a wireless sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to implement security. Firstly an evaluation of possible security mechanisms and their power consumption was done by measuring the avalanche effect and character frequency of the sym- metric algorithms Blowfish, RC2 and XTEA. Secondly, the required CPU time which is needed by each algorithm for encrypting a demo plaintext, was measured and analyzed. Summariz- ing both analysis, the XTEA algorithm, run in CBC mode, is the recommendation for the XC ARFID tags. The testing processes and the results are presented in detail in this thesis.

Page generated in 0.1032 seconds