Loading…

Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi

Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If...

Full description

Saved in:
Bibliographic Details
Main Authors: Kojima, Hideharu, Yanai, Naoto
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each sensor node creates a route between itself and the sink node to send sensing data. If attackers succeed to inject fake data or fake route information during a process to create its route, critical problems may occur. For example, the sink node cannot collect sensing data, sensor nodes cannot receive commands from the sink node, and looped routes might be created. To prevent attackers from injecting fake route information, secure routing protocols with authentication tools, such as digital signatures, have been proposed. In this paper, we focus on ISDSR that is a multi hop secure routing protocol. ISDSR guarantees route information that contains a collection of nodes storing a travel path of the received packet. Sensor nodes need more computational processes to generate signatures and to verify signatures comparing with standard multi hop routing protocols, such as AODV and DSR, by applying secure routing protocols to WSNs. In order to run secure routing protocols on a sensor node, developers have to evaluate performances on low performance devices. How long do calculation times take to generate a signature and to verify a signature? How many length of a generated signature does a packet need? To evaluate these performances on real devices, we implement both the signature algorithm of ISDSR as a multi-signature scheme and an RSA-based signature algorithm as a standard signature scheme on a Raspberry Pi. Then, we conduct experiments to measure round trip times including calculation times between two nodes and packet sizes.
ISSN:2379-1896
DOI:10.1109/CANDAR.2017.68