scispace - formally typeset
Open AccessProceedings ArticleDOI

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.
Abstract
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Time synchronization in wireless sensor networks: a survey

TL;DR: The goal for writing this paper is to study most common existing time synchronization approaches and stress the need of a new class of secure-time synchronization protocol that is scalable, topology independent, fast convergent, energy efficient, less latent and less application dependent in a heterogeneous hostile environment.
Journal ArticleDOI

Secure ad hoc trust initialization and key management in wireless body area networks

TL;DR: This article proposes group device pairing (GDP), a user-aided multi-party authenticated key agreement protocol that supports fast batch deployment, addition and revocation of sensor devices, does not rely on any additional hardware device, and is mostly based on symmetric key cryptography.
Journal ArticleDOI

Data Collection for Security Measurement in Wireless Sensor Networks: A Survey

TL;DR: An overview of WSNs is provided and classify the attacks in W SNs based on protocol stack layers and attack detection methods of eleven mainstream attacks are researched for WSN security measurement.
Proceedings ArticleDOI

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks

TL;DR: The results show that Localized Multicast is more efficient than previous distributed approaches in terms of communication and memory costs and the probability of detecting node replicas is much higher than that achieved in previous distributed protocols.
Journal ArticleDOI

Access control in wireless sensor networks

TL;DR: An access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI

SPINS: security protocols for sensor networks

TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.