Power-Efficient Architecture of Zigbee Security Processing
In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptograp...
Saved in:
Published in | 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications pp. 773 - 778 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2008
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptographic operation. Early researches about the security hardware architectures make design metrics with data throughput, gate usage, and power consumption to demonstrate the efficiency of their architectures. In this paper, we provide an efficient hardware architecture of the security processing for ZigBee, which satisfies the constraints IEEE 802.15.4 standard requires. These requirements mainly consist of the critical response time, the verification delay, and the throughput. In experiments, we implemented the security processing for ZigBee that used fewer logic gates and consumed low power than other earlier ZigBee chips and fulfilled the standard requirements with considerable margins. |
---|---|
AbstractList | In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptographic operation. Early researches about the security hardware architectures make design metrics with data throughput, gate usage, and power consumption to demonstrate the efficiency of their architectures. In this paper, we provide an efficient hardware architecture of the security processing for ZigBee, which satisfies the constraints IEEE 802.15.4 standard requires. These requirements mainly consist of the critical response time, the verification delay, and the throughput. In experiments, we implemented the security processing for ZigBee that used fewer logic gates and consumed low power than other earlier ZigBee chips and fulfilled the standard requirements with considerable margins. |
Author | Jiho Kim Jungyu Lee Ohyoung Song |
Author_xml | – sequence: 1 surname: Jiho Kim fullname: Jiho Kim organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea – sequence: 2 surname: Jungyu Lee fullname: Jungyu Lee organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea – sequence: 3 surname: Ohyoung Song fullname: Ohyoung Song organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea |
BookMark | eNotjE1Lw0AUABdswbbm6MlL_kDq26_sW2-h1FooGKhevJRk921d0UQ2KdJ_r6KnYWCYOZt0fUeMXXNYcg72druvq6UAwB-VFyyzBsGUVktlOE7YTHCNheUGp2z-m1lAYdUly4bhDQAkR7QWZuyu7r8oFesQoovUjXmV3GscyY2nRHkf8pd4bInyPblTiuM5r1PvaBhid7xi09C8D5T9c8Ge79dPq4di97jZrqpdEbnRY-Fli41UUnGtiKAkKm0QZRNa9E4BGWGs99Jwz6VE41BrhcF620AoW-7lgt38fSMRHT5T_GjS-aCM0EJo-Q3o4Esj |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ISPA.2008.113 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore Digital Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 778 |
ExternalDocumentID | 4725225 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-d3b8a3434154ee06ee69f26afb8dc40e7279dd371d13387c85548f9d9a0f6b1d3 |
IEDL.DBID | RIE |
ISBN | 9780769534718 0769534716 |
ISSN | 2158-9178 |
IngestDate | Wed Jun 26 19:22:11 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2008908294 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-d3b8a3434154ee06ee69f26afb8dc40e7279dd371d13387c85548f9d9a0f6b1d3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_4725225 |
PublicationCentury | 2000 |
PublicationDate | 2008-Dec. |
PublicationDateYYYYMMDD | 2008-12-01 |
PublicationDate_xml | – month: 12 year: 2008 text: 2008-Dec. |
PublicationDecade | 2000 |
PublicationTitle | 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications |
PublicationTitleAbbrev | ISPDPA |
PublicationYear | 2008 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003188990 ssj0001967101 |
Score | 1.4455241 |
Snippet | In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 773 |
SubjectTerms | Communication system security Computer architecture Cryptography Data security Delay Energy consumption Hardware Power system security Throughput ZigBee |
Title | Power-Efficient Architecture of Zigbee Security Processing |
URI | https://ieeexplore.ieee.org/document/4725225 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-AkydUMH6nB48WtnXrWm_EQNAEQ4IkxAtZ21dDTMAYuPjX-9qNjxgP3tYdmq173fvo7_1-hNxBkliDpsO44pahUThWCGOZy6yx2qrChFL26EUMp-nzLJvVyP2uFwYAAvgMOv4ynOXbldn4Ulk3zRMMF7I6qcsoKXu19vUUJdBZxrsx2iqmEr7Egk7N7-lcllm7yjj-kEVFvrMdyz3_ZvdpMu6VKMvYqx4cqK4EpzNoktH2cUusyUdns9Yd8_2LyfG_73NM2vv2PjreOa4TUoPlKWlu9R1otd1b5GHsJdRYP7BM4Ey0d3DqQFeOvi3eNQCdVBp4tOo6wEnbZDrovz4OWaW1wBYYQKyZ5VoWPEWflqUAkQAQyiWicFpak0aAYY6yluex9Ultbjy6TTqFHzNyQseWn5HGcrWEc0JFkcbSCcWliVPPC2xckWQFJLF1gmtxQVp-KeafJZ3GvFqFy79vX5GjANEICJJr0lh_beAG44C1vg0G8AMb3qry |
link.rule.ids | 310,311,786,790,795,796,802,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG8QD3pCBeO3PXi0wNatW70RAwEFQgIkxAvZ2ldDTMCYcfGv97UbHzEevK07NFv3uvfR3_v9CHkA39cKTYdxyTVDozAsEUozE2qlUy0T5UrZg6HoToOXWTgrkcdtLwwAOPAZ1O2lO8vXK7W2pbJGEPkYLoQH5BD9fFPm3Vq7iooU6C697RitFZMJW2RBt2Z3dRTnebsMOf6SRUG_sxnHOwbORm88auU4S8_qHuzprji306mQweaBc7TJR32dpXX1_YvL8b9vdEJquwY_Otq6rlNSguUZqWwUHmix4avkaWRF1Fjb8UzgTLS1d-5AV4a-Ld5TADouVPBo0XeAk9bItNOePHdZobbAFhhCZEzzNE54gF4tDACaAkBI44vEpLFWQRMw0JFa88jTNq2NlMW3xUbi52wakXqan5PycrWEC0JFEnixEZLHygssM7AyiR8m4HvaCJ6KS1K1SzH_zAk15sUqXP19-54cdSeD_rzfG75ek2MH2HB4khtSzr7WcItRQZbeOWP4AVvUrkg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+IEEE+International+Symposium+on+Parallel+and+Distributed+Processing+with+Applications&rft.atitle=Power-Efficient+Architecture+of+Zigbee+Security+Processing&rft.au=Jiho+Kim&rft.au=Jungyu+Lee&rft.au=Ohyoung+Song&rft.date=2008-12-01&rft.pub=IEEE&rft.isbn=9780769534718&rft.issn=2158-9178&rft.spage=773&rft.epage=778&rft_id=info:doi/10.1109%2FISPA.2008.113&rft.externalDocID=4725225 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-9178&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-9178&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-9178&client=summon |