A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
David J. Malan,Matt Welsh,Michael D. Smith +2 more
- pp 71-80
Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.Abstract:
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.read more
Citations
More filters
Book ChapterDOI
A method of pair-wise key distribution and management in distributed wireless sensor networks
TL;DR: A simple pair-wise key distribution and management approach for distributed wireless sensor networks facing tremendous challenges, which proves the scalability of this method.
Dissertation
Security Strategies In Wireless Sensor Networks
TL;DR: This thesis explores security issues in wireless sensor networks, and network-layer countermeasures to threats involving routing metrics, and consideration is given to further work on how cognitive security can save energy by allowing nodes to develop a more efficient awareness of their threat environment.
Journal ArticleDOI
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
Parveiz Nazir Lone,Deep Singh,Veronika Stoffova,D. C. Mishra,Umar Hussain Mir,Neerendra Kumar +5 more
TL;DR: In this article, cryptanalysis is performed on an existing encryption scheme designed using elliptic curve cryptography (ECC) and a Hill cipher that is vulnerable to brute force attacks and lacks both Shannon's primitive operations of cryptography and Kerckchoff's principle.
Networks, a Cross-layer Approach
TL;DR: This paper proposes a cross-layer scheme that uses information from the application layer to locate compromised nodes, computes a new, secure path connecting the source and destination and routes data packets along the new path to the destination.
Journal ArticleDOI
Exponential Stability of Nonlinear Stochastic Systems with Time-delay
Wei Qian,Shaohua Wang,Juan Liu +2 more
TL;DR: A novel delay-dependent sufficient condition for exponential stability in mean square is derived in terms of linear matrix inequalities, and it is proved in theory that the obtained stability condition is less conservative than some existing ones.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.