Learn More
— This paper presents an analytical model to predict energy consumption in saturated IEEE 802.11 single-hop ad hoc networks under ideal channel conditions. The model we introduce takes into account the different operational modes of the IEEE 802.11 DCF MAC, and is validated against packet-level simulations. In contrast to previous works that attempted to(More)
— In this work we characterize the energy consumption of a visual sensor network testbed. Each node in the testbed consists of a " single-board computer " , namely Crossbow's Stargate, equipped with a wireless network card and a webcam. We assess energy consumption of activities representative of the target application (e.g., perimeter surveillance) using a(More)
We present Marvin, a new parallelizable message authentication code based on the ALRED family. The new algorithm is designed with resource-constrained platforms in mind and explores the structure of an underlying block cipher to provide security at a small cost in terms of memory needs. Also, we show how Marvin can be used as an authentication-only function(More)
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in hostile environments. Thus, the adoption of security mechanisms is fundamental. However, the extremely constrained nature of sensors and the potentially dynamic behavior of WSNs hinder the use of key management mechanisms commonly applied in modern networks. For this(More)
In this paper, we describe our work on instrumenting network simulators to enable them to adequately and accurately account for the energy consumed by ad hoc network protocols' communication-related tasks. This is accomplished by explicitly accounting for low-power radio modes and considering the different energy costs associated with each possible radio(More)
Privacy is a key concern in Location Based Applications (LBAs), especially due to their intensive use resource constrained devices in which general purpose ciphers are dicult to deploy. In this paper, we address this issue by specifying a new, faster key-schedule algorithm for the Curupira block cipher. This special-purpose cipher follows the Wide Trail(More)
— This paper approaches energy consumption characterization in mobile computing platforms by assessing energy consumption of " basic " application-level tasks, such as as processing, input/output (disk, display, etc.), communication (transmission and reception over the network), and combinations thereof. Besides providing information on the energy(More)
—Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors impose a difficult challenge: their reduced availability of memory, processing power and(More)
—This paper proposes a novel approach to capacity sharing in hybrid networked environments, i.e., environments that consist of infrastructure-based as well as infrastructure-less networks. The proposed framework is based on Software-Defined Networking (SDN) and provides flexible, efficient, and secure capacity sharing solutions in a variety of hybrid(More)