The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%., {"references":["Y. Zhong, L. Cheng, L. Zhang, Y. Song, and H. R. Karimi,\n\"Energy-efficient routing control algorithm in large-scale wsn for water\nenvironment monitoring with application to three gorges reservoir area,\"\nThe Scientific World Journal, vol. 2014, 2014.","M. Turkanovi´c, B. Brumen, and M. H¨olbl, \"A novel user authentication\nand key agreement scheme for heterogeneous ad hoc wireless\nsensor networks, based on the Internet of Things notion,\" Ad\nHoc Networks, vol. 20, pp. 96–112, sep 2014. (Online). Available:\nhttp://linkinghub.elsevier.com/retrieve/pii/S157087051400064X","L. D. Xu, W. He, and S. Li, \"Internet of things in industries: A\nsurvey,\" IEEE Transactions on Industrial Informatics, vol. 10, no. 4,\npp. 2233–2243, 2014.","M. Elshrkawey, S. M. Elsherif, and M. E. Wahed, \"An enhancement\napproach for reducing the energy consumption in wireless sensor\nnetworks,\" Journal of King Saud University-Computer and Information\nSciences, 2017.","Z. Jiang and Y. Pan, From Problem to Solution: Wireless Sensor\nNetworks Security. Commack, NY, USA: Nova Science Publishers,\nInc., 2009.","S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, \"Security,\nprivacy and trust in internet of things: The road ahead,\" Computer\nNetworks, vol. 76, pp. 146–164, 2015.","M. K. Jain, \"Wireless sensor networks: Security issues and challenges,\"\nInternational Journal of Computer and Information Technology, vol. 2,\nno. 1, pp. 62–67, 2011.","D. K. G., M. K. Singh, and M. Jayanthi, Eds., Network Security\nAttacks and Countermeasures. IGI Global, 2016. (Online). Available:\nhttp://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1\n-4666-8761-5","S. B. Othman, A. A. Bahattab, A. Trad, and H. Youssef, \"Confidentiality\nand integrity for data aggregation in wsn using homomorphic\nencryption,\" Wireless Personal Communications, vol. 80, no. 2, pp.\n867–889, 2015.\n[10] H. Modares, R. Salleh, and A. Moravejosharieh, \"Overview of security\nissues in wireless sensor networks,\" in Computational Intelligence,\nModelling and Simulation (CIMSiM), 2011 Third International\nConference on. IEEE, 2011, pp. 308–311.\n[11] S. Sciancalepore, G. Piro, E. Vogli, G. Boggia, and L. A. Grieco,\n\"On securing ieee 802.15. 4 networks through a standard compliant\nframework,\" in Euro Med Telco Conference (EMTC), 2014. IEEE,\n2014, pp. 1–6.\n[12] S. B. Othman, A. Trad, and H. Youssef, \"Performance evaluation of\nencryption algorithm for wireless sensor networks,\" in Information\nTechnology and e-Services (ICITeS), 2012 International Conference on.\nIEEE, 2012, pp. 1–8.\n[13] A. Trad, A. A. Bahattab, and S. B. Othman, \"Performance trade-offs\nof encryption algorithms for wireless sensor networks,\" in Computer\nApplications and Information Systems (WCCAIS), 2014 World Congress\non. IEEE, 2014, pp. 1–6.\n[14] C. Panait and D. Dragomir, \"Measuring the performance and energy\nconsumption of aes in wireless sensor networks,\" in Computer Science\nand Information Systems (FedCSIS), 2015 Federated Conference on.\nIEEE, 2015, pp. 1261–1266.\n[15] J. Lee, K. Kapitanova, and S. H. Son, \"The price of security in wireless\nsensor networks,\" Computer Networks, vol. 54, no. 17, pp. 2967–2978,\n2010.\n[16] A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, \"Powertrace:\nNetwork-level power profiling for low-power wireless networks,\" 2011.\n[17] A. V. Taddeo, M. Mura, and A. Ferrante, \"Qos and security\nin energy-harvesting wireless sensor networks,\" in Security and\nCryptography (SECRYPT), Proceedings of the 2010 International\nConference on. IEEE, 2010, pp. 1–10.\n[18] J. Misic and V. Misic, Wireless personal area networks: Performance,\ninterconnection, and security with IEEE 802.15. 4. John Wiley & Sons,\n2008, vol. 1.\n[19] A. Dunkels, \"The ContikiMAC Radio Duty Cycling\nProtocol,\" SICS, Tech. Rep., 2011. (Online). Available:\nhttp://soda.swedish-ict.se/5128/1/contikimac-report.pdf\n[20] \"Moteiv Corporation. SkyTmote Datasheet,\"\n2006, (Online Document) Available:\nhttp://www.eecs.harvard.edu/ konrad/projects/shimmer/references/tmotesky-\ndatasheet.pdf."]}