How Public Key Cryptography Influences Wireless Sensor Node Lifetime. Piotrowski, K., Langendoerfer, P., & Peter, S. In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, of SASN '06, pages 169–176, New York, NY, USA, 2006. ACM.
How Public Key Cryptography Influences Wireless Sensor Node Lifetime [link]Paper  doi  abstract   bibtex   
In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks. We investigate four types of nodes; MICA2DOT, MICA2, MICAz and TelosB. For all these nodes we estimate the power consumption for most common RSA and ECC operations, i.e., signature generation and verification as well as key exchange mechanisms. We also estimate the power consumed by the transmission of their results. Our results show that the application of strong cryptography is feasible. Even for the most constrained node performing the ECC-160 signature once every 10 minutes increases the duty cycle only by about 0.5 per cent, i.e., the influence to the lifetime is not significant. Nevertheless, the public key cryptography shall be used with care.
@inproceedings{piotrowski_how_2006,
	address = {New York, NY, USA},
	series = {{SASN} '06},
	title = {How {Public} {Key} {Cryptography} {Influences} {Wireless} {Sensor} {Node} {Lifetime}},
	isbn = {978-1-59593-554-0},
	url = {http://doi.acm.org/10.1145/1180345.1180366},
	doi = {10.1145/1180345.1180366},
	abstract = {In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks. We investigate four types of nodes; MICA2DOT, MICA2, MICAz and TelosB. For all these nodes we estimate the power consumption for most common RSA and ECC operations, i.e., signature generation and verification as well as key exchange mechanisms. We also estimate the power consumed by the transmission of their results. Our results show that the application of strong cryptography is feasible. Even for the most constrained node performing the ECC-160 signature once every 10 minutes increases the duty cycle only by about 0.5 per cent, i.e., the influence to the lifetime is not significant. Nevertheless, the public key cryptography shall be used with care.},
	urldate = {2015-11-02TZ},
	booktitle = {Proceedings of the {Fourth} {ACM} {Workshop} on {Security} of {Ad} {Hoc} and {Sensor} {Networks}},
	publisher = {ACM},
	author = {Piotrowski, Krzysztof and Langendoerfer, Peter and Peter, Steffen},
	year = {2006},
	pages = {169--176}
}

Downloads: 0