A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
Citations
2,687 citations
1,751 citations
Additional excerpts
...TinyCrypt, still in development at Harvard, aims to use elliptic curve cryptography to exchange TinySec keys for the Mica2 sensor nodes [32]....
[...]
1,708 citations
Cites background from "A public-key infrastructure for key..."
...In the medical field sensor networks can be used to remotely and unobtrusively monitor physiological parameters of patients such as heartbeat or blood pressure, and report to the hospital when some parameters are altered [81,37,5,82]....
[...]
...Though some recent work has shown that public key cryptography may be possible to use in sensor networks [126,38,81]....
[...]
1,060 citations
966 citations
Cites background from "A public-key infrastructure for key..."
...In traditional networks such as the Internet, Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols (e.g., SSL [3] and IPsec [18])....
[...]
References
14,980 citations
"A public-key infrastructure for key..." refers methods in this paper
...In Section III, we address shortcomings in that infrastructure with a look at an implementation of Diffie-Hellman for the MICA2 based on the Discrete Logarithm Problem (DLP) and expose weaknesses in its design for sensor networks....
[...]
...Ultimately, not only does EccM 2.0 employ much less memory than does EccM 1.0 (Table VIII), its running time bests that for Diffie-Hellman based on DLP, using keys an order of magnitude smaller in size but no less secure....
[...]
...With a form of Diffie-Hellman, then, could two nodes thus establish a shared secret for use as TinySec’s key....
[...]
...Although a node is unlikely to have—or, at least, need—so many neighbors or certificate authorities for whom it needs public keys, Diffie-Hellman’s relatively large key sizes are unfortunate in the MICA2’s resource-constrained environment....
[...]
...Available: {http://csrc.nist.gov/CryptoToolkit/kms/ guideline-1-Jan03.pdf} [19] BBN Technologies, “Diffie-Hellman 1,” July 2003....
[...]
5,378 citations
"A public-key infrastructure for key..." refers background in this paper
...ECDLP, on which ECC [28], [29] is based, typically involves recovery over some Galois (i....
[...]
4,004 citations
2,703 citations
2,687 citations