Exploiting value locality for secure-energy aware communication

H. Saputra, N. Vijaykrishnan, M. Kandemir, R. Brooks, M. J. Irwin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Minimizing energy consumption is important for prolonging the life of battery-powered sensor nodes. A major portion of a sensor power budget in a distributed sensor network is consumed by communication with adjacent nodes. Another issue with the communication of data among the sensor nodes is the possibility of leaking confidential sensed data to adversaries. The adoption of standard encryption techniques for protecting the transmitted data is not attractive in this environment as it is costly in terms of energy consumption. We present a new energy-efficient and secure communication protocol that exploits the locality of data transfer in distributed sensor networks. Our evaluation reveals that the proposed technique is specifically effective in sensor applications that involve frequent communications with a high data locality.

Original languageEnglish (US)
Title of host publication2003 IEEE Workshop on Signal Processing Systems
Subtitle of host publicationDesign and Implementation, SIPS 2003
EditorsWonyong Sung, Myung Hoon Sunwoo
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages116-121
Number of pages6
ISBN (Electronic)0780377958
DOIs
StatePublished - 2003
Event2003 IEEE Workshop on Signal Processing Systems, SIPS 2003 - Seoul, Korea, Republic of
Duration: Aug 27 2003Aug 29 2003

Publication series

NameIEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation
Volume2003-January
ISSN (Print)1520-6130

Other

Other2003 IEEE Workshop on Signal Processing Systems, SIPS 2003
Country/TerritoryKorea, Republic of
CitySeoul
Period8/27/038/29/03

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Signal Processing
  • Applied Mathematics
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Exploiting value locality for secure-energy aware communication'. Together they form a unique fingerprint.

Cite this