A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
David J. Malan,Matt Welsh,Michael D. Smith +2 more
- pp 71-80
Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.Abstract:
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.read more
Citations
More filters
Proceedings ArticleDOI
Secure Hierarchical Data Aggregation in Wireless Sensor Networks
Julia Albath,Sanjay Kumar Madria +1 more
TL;DR: This work proposes a new algorithm using homomorphic encryption and additive digital signatures to achieve confidentiality, integrity and availability for in-network aggregation in wireless sensor networks and proves that the digital signature algorithm which is based on the Elliptic Curve Digital Signature Algorithm is as secure as ECDSA.
Journal ArticleDOI
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs
TL;DR: This paper analyzes an existing mutual authentication scheme designed for two-hop WBANs with anonymous and untraceable key establishment, and proposes a new authentication and key agreement scheme, with anonymity andUntraceability.
Journal ArticleDOI
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
Yun Zhou,Yuguang Fang +1 more
TL;DR: This paper proposes a novel key establishment scheme, called LAKE, for sensor networks that uses a t-degree trivariate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space.
Journal ArticleDOI
SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
TL;DR: This paper presents a self-contained public key-management scheme, a scalable method of cryptographic key management (SMOCK), which achieves almost zero communication overhead for authentication, and offers high service availability.
Proceedings ArticleDOI
Lightweight security framework for IoTs using identity based cryptography
TL;DR: This work develops a hierarchical security architecture for IoTs and further develop protocols for secure communication in IoTs using identity based cryptography and shows that the proposed mechanism is lightweight incurring lesser overhead and thus can be applied in Io Ts.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.