A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
David J. Malan,Matt Welsh,Michael D. Smith +2 more
- pp 71-80
Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.Abstract:
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.read more
Citations
More filters
Proceedings ArticleDOI
A Key Management Scheme for Cluster Based Wireless Sensor Networks
TL;DR: The goal is to introduce a platform in which public key cryptography is used to establish a secure link between sensor nodes and gateways, and instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establishA secure link with its neighbors after clustering phase.
Journal ArticleDOI
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
TL;DR: Analysis and simulation results show that the proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.
Journal ArticleDOI
On handling insider attacks in wireless sensor networks
TL;DR: This article presents security strategies to cope with insider attacks and a classification of mechanisms which apply the strategies and shows that strategies and mechanisms for wireless sensor networks have different characteristics and realizations than in classic computer systems because of the special requirements and conditions.
Book
Attacks And Defenses Of Ubiquitous Sensor Networks
S. Shankar Sastry,Tanya Roosta +1 more
TL;DR: A game theoretic framework is used to analyze and build a distributed reputation mechanism for sensor networks that helps detect node misbehavior and isolate malicious entities and develops two security solutions for process control systems.
Proceedings ArticleDOI
Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis
Vimal Kumar,Sanjay Kumar Madria +1 more
TL;DR: Unlike many other secure data aggregation algorithms which require separate phases for secure aggregation and integrity verification, the secure hierarchical data aggregation algorithm does not require an additional phase for verification and saves energy by avoiding additional transmissions and computational overhead on the sensor nodes.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.