Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante


Wireless sensor networks are composed of small nodes that might be used for a variety of purposes. Nodes communicate together through a wireless connection that might be subject to different attacks when the network is placed in hostile environments. Furthermore, the nodes are usually equipped with very small batteries providing limited battery life, therefore limited power consumption is of utmost importance for nodes. This is in clear opposition with the requirement of providing security to communications as security might be very expensive from the power consumption stand point. Energy harvesting methods can be used to recharge batteries, but, in most of the cases the recharge profile cannot be known in advance. Therefore, nodes might face periods of time in which no recharge is available and the battery level is low. In this paper we introduce an optimization mechanism that allows the system to change the communication security settings at runtime with the goal of improving node lifetime, yet providing a suitable security level. The optimization mechanism further improves energy consumption by putting in place a quality of service mechanism: when energy is scarce, the system tends to send only essential packets. As shown by the simulations presented in this paper, this mechanism optimizes the energy consumption among different recharges.


  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4):393-422.
  2. Alippi, C., Camplani, R., Galperti, C., and Roveri, M. (2008). Effective design of wsns: From the lab to the real world. In Sensing Technology, 2008. ICST 2008. 3rd International Conference on, pages 1-9.
  3. Chandramouli, R., Bapatla, S., Subbalakshmi, K. P., and Uma, R. N. (2006). Battery power-aware encryption. ACM Trans. Inf. Syst. Secur., 9(2):162-180.
  4. Chigan, C., Li, L., and Ye, Y. (2005). Resource-aware self-adaptive security provisioning in mobile ad hoc networks. In Wireless Communications and Networking Conference, 2005 IEEE, volume 4, pages 2118- 2124Vol.4.
  5. Derin, O., Ferrante, A., and Taddeo, A. V. (2009). Coordinated management of hardware and software selfadaptivity. Journal of Systems Architecture, 55(3):170 - 179. Challenges in self-adaptive computing (Selected papers from the Aether-Morpheus 2007 workshop).
  6. Ferrante, A., Piuri, V., and Owen, J. (2005). IPSec Hardware Resource Requirements Evaluation. In NGI 2005, Rome, Italy. EuroNGI.
  7. Grosssch├Ądl, J., Szekely, A., and Tillich, S. (2007). The energy cost of cryptographic key establishment in wireless sensor networks. In ASIACCS 7807: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 380-382, New York, NY, USA. ACM.
  8. Keeratiwintakorn, P. and Krishnamurthy, P. (2006). Energy efficient security services for limited wireless devices. In Proc. 1st International Symposium on Wireless Pervasive Computing, pages 1-6.
  9. Lighfoot, L., Ren, J., and Li, T. (2007). An energy efficient link-layer security protocol for wireless sensor networks. In Electro/Information Technology, 2007 IEEE International Conference on, pages 233-238.
  10. Liu, S., Qiu, Q., and Wu, Q. (2008). Energy aware dynamic voltage and frequency selection for real-time systems with energy harvesting. In DATE 7808: Proceedings of the conference on Design, automation and test in Europe, pages 236-241, New York, NY, USA. ACM.
  11. Liu, S., Wu, Q., and Qiu, Q. (2009). An adaptive scheduling and voltage/frequency selection algorithm for realtime energy harvesting systems. In DAC 7809: Proceedings of the Design and Automation Conference, pages 782-787.
  12. Moser, C., Brunelli, D., Thiele, L., and Benini, L. (2007a). Real-time scheduling for energy harvesting sensor nodes. Real-Time Syst., 37(3):233-260.
  13. Moser, C., Chen, J.-J., and Thiele, L. (2008). Reward maximization for embedded systems with renewable energies. In Embedded and Real-Time Computing Systems and Applications, 2008. RTCSA 7808. 14th IEEE International Conference on, pages 247-256.
  14. Moser, C., Thiele, L., Brunelli, D., and Benini, L. (2007b). Adaptive power management in energy harvesting systems. In DATE 7807: Proceedings of the conference on Design, automation and test in Europe, pages 773-778, San Jose, CA, USA. EDA Consortium.
  15. Mura, M., Fabbri, F., and Sami, M. (2008). Modelling the power cost of security in wireless sensor networks: the case of 802.15.4. In Proceedings of IEEE ICT08, Saint Petersburg, Russia.
  16. Mura, M., Paolieri, M., Negri, L., Fabri, F., and Sami, M. (2007). Power modeling and power analysis for ieee 802.15.4: a concurrent state machine approach. In Proceedings of CCNC 2007, Las Vegas, USA.
  17. Mura, M. and Sami, M. (2008). Code generation from statecharts: Simulation of wireless sensor networks. In Proceedings of DSD08, Parma, Italy.
  18. Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. (2004). Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491.
  19. Roundy, S., Steingart, D., Frechette, L., Wright, P., and Rabaey, J. (2004). Power sources for wireless sensor networks. In Wireless Sensor Networks, volume 2920 of Lecture Notes in Computer Science, pages 1-17. Springer Berlin / Heidelberg.
  20. Sastry, N. and Wagner, D. (2004). Security considerations for ieee 802.15.4 networks. In WiSe 7804: Proceedings of the 3rd ACM workshop on Wireless security, pages 32-42, New York, NY, USA. ACM.
  21. Sean Convery (2004). Internetworking Technologies Handbook, chapter 49, pages 49-1 - 49-32. Cisco Press.
  22. Wang, L., Yang, Y., Noh, D. K., Le, H., Abdelzaher, T., and Ward, M. (2009). Adaptsens: An adaptive data collection and storage service for solar-powered sensor networks. In Proceedings of RTSS 2009.

Paper Citation

in Harvard Style

Vincenzo Taddeo A., Mura M. and Ferrante A. (2010). QOS AND SECURITY IN ENERGY-HARVESTING WIRELESS SENSOR NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 241-250. DOI: 10.5220/0002982202410250

in Bibtex Style

author={Antonio Vincenzo Taddeo and Marcello Mura and Alberto Ferrante},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},

in EndNote Style

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
SN - 978-989-8425-18-8
AU - Vincenzo Taddeo A.
AU - Mura M.
AU - Ferrante A.
PY - 2010
SP - 241
EP - 250
DO - 10.5220/0002982202410250