Exploiting value locality for secure-energy aware communication

H. Saputra, N. Vijaykrishnan, M. Kandemir, R. Brooks, M. J. Irwin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations


Minimizing energy consumption is important for prolonging the life of battery-powered sensor nodes. A major portion of a sensor power budget in a distributed sensor network is consumed by communication with adjacent nodes. Another issue with the communication of data among the sensor nodes is the possibility of leaking confidential sensed data to adversaries. The adoption of standard encryption techniques for protecting the transmitted data is not attractive in this environment as it is costly in terms of energy consumption. We present a new energy-efficient and secure communication protocol that exploits the locality of data transfer in distributed sensor networks. Our evaluation reveals that the proposed technique is specifically effective in sensor applications that involve frequent communications with a high data locality.

Original languageEnglish (US)
Title of host publication2003 IEEE Workshop on Signal Processing Systems
Subtitle of host publicationDesign and Implementation, SIPS 2003
EditorsWonyong Sung, Myung Hoon Sunwoo
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)0780377958
StatePublished - Jan 1 2003
Event2003 IEEE Workshop on Signal Processing Systems, SIPS 2003 - Seoul, Korea, Republic of
Duration: Aug 27 2003Aug 29 2003

Publication series

NameIEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation
ISSN (Print)1520-6130


Other2003 IEEE Workshop on Signal Processing Systems, SIPS 2003
Country/TerritoryKorea, Republic of

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Signal Processing
  • Applied Mathematics
  • Hardware and Architecture


Dive into the research topics of 'Exploiting value locality for secure-energy aware communication'. Together they form a unique fingerprint.

Cite this