{"id":"https://openalex.org/W2077494162","doi":"https://doi.org/10.1109/percomw.2013.6529559","title":"Evaluating energy-efficiency of hardware-based security mechanisms","display_name":"Evaluating energy-efficiency of hardware-based security mechanisms","publication_year":2013,"publication_date":"2013-03-01","ids":{"openalex":"https://openalex.org/W2077494162","doi":"https://doi.org/10.1109/percomw.2013.6529559","mag":"2077494162"},"language":"en","primary_location":{"id":"doi:10.1109/percomw.2013.6529559","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomw.2013.6529559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023136097","display_name":"Christian Haas","orcid":"https://orcid.org/0000-0002-2690-5962"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Christian Haas","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077640811","display_name":"S. M\u00fcnz","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stephan Munz","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083368993","display_name":"Joachim Wilke","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Joachim Wilke","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031037731","display_name":"Anton Hergenr\u00f6der","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Anton Hergenroder","raw_affiliation_strings":["Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Telematics, Karlsruhe Institute of Technology, Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Inst. of Telematics, Karlsruhe Inst. of Technol., Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023136097"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":0.377,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6803915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"560","last_page":"565"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8127197027206421},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039301633834839},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.7374446392059326},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6590460538864136},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5833500623703003},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5782176852226257},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5254349112510681},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.5027503967285156},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4946734607219696},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4727246165275574},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4320933520793915},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.32972151041030884},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27406442165374756},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26345929503440857},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24349939823150635},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20016223192214966},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16918134689331055},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.15781137347221375},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10791909694671631},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.10754069685935974}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8127197027206421},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039301633834839},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.7374446392059326},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6590460538864136},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5833500623703003},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5782176852226257},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5254349112510681},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.5027503967285156},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4946734607219696},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4727246165275574},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4320933520793915},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.32972151041030884},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27406442165374756},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26345929503440857},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24349939823150635},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20016223192214966},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16918134689331055},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.15781137347221375},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10791909694671631},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.10754069685935974},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/percomw.2013.6529559","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomw.2013.6529559","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.884.7942","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.884.7942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://telematics.tm.kit.edu/publications/Files/534/paper.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W183369512","https://openalex.org/W1518306097","https://openalex.org/W1946495429","https://openalex.org/W1996221917","https://openalex.org/W2104221518","https://openalex.org/W2118705506","https://openalex.org/W2134585683","https://openalex.org/W2163716836","https://openalex.org/W2539221331","https://openalex.org/W2669464562","https://openalex.org/W6607389942"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W4388857716","https://openalex.org/W1847785363"],"abstract_inverted_index":{"Security":[0],"in":[1,46,52,133],"Wireless":[2],"Sensor":[3],"Networks":[4],"(WSNs)":[5],"is":[6],"an":[7,103],"omnipresent":[8],"topic.":[9],"In":[10,60,92],"many":[11],"application":[12],"scenarios,":[13],"like":[14,122],"the":[15,39,49,61,65,84,97,110,115,125,134,138,147,165,169,181],"surveillance":[16],"of":[17,38,54,67,105,114,141,154,168],"critical":[18],"areas":[19],"or":[20],"infrastructures,":[21],"security":[22,71,99],"mechanisms":[23,174],"have":[24,43],"to":[25,28,35,80,118,152,175,180],"be":[26],"used":[27,40],"build":[29],"reliable":[30],"and":[31,58,101,112],"secure":[32],"applications.":[33],"Up":[34],"now,":[36],"most":[37],"cryptographic":[41],"algorithms":[42],"been":[44,74,89],"implemented":[45],"software":[47,81,120,182],"despite":[48],"resource":[50],"constraints":[51],"terms":[53],"processing":[55],"power,":[56],"memory":[57],"energy.":[59],"past":[62],"few":[63],"years,":[64],"usage":[66],"special":[68],"hardware":[69,116],"accelerated":[70],"modules":[72],"has":[73,86],"proposed":[75],"as":[76],"a":[77,172],"viable":[78],"alternative":[79],"implementations.":[82],"However,":[83],"energy-efficiency":[85,113],"not":[87],"yet":[88],"evaluated":[90],"in-depth.":[91],"this":[93],"paper,":[94],"we":[95,128],"analyze":[96],"VaultIC420":[98,148,170],"module":[100,117],"present":[102],"evaluation":[104,144],"its":[106],"energy-efficiency.":[107],"We":[108],"compare":[109],"performance":[111],"common":[119],"implementations":[121],"TinyECC.":[123],"For":[124],"energy":[126,155],"measurements,":[127],"use":[129],"IRIS":[130],"sensor":[131],"nodes":[132],"SANDbed":[135],"testbed":[136],"at":[137],"Karlsruhe":[139],"Institute":[140],"Technology.":[142],"Our":[143],"shows,":[145,163],"that":[146,164],"can":[149],"save":[150],"up":[151],"76%":[153],"using":[156],"different":[157],"MAC":[158],"layer":[159],"protocols.":[160],"It":[161],"also":[162],"current":[166],"draw":[167],"requires":[171],"duty-cycling":[173],"achieve":[176],"any":[177],"savings":[178],"compared":[179],"implementation.":[183]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
