A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
David J. Malan,Matt Welsh,Michael D. Smith +2 more
- pp 71-80
Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.Abstract:
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.read more
Citations
More filters
Proceedings ArticleDOI
Efficient flooding in Wireless Sensor Networks secured with neighborhood keys
TL;DR: This paper addresses the problem of minimizing the number of unicast transmissions required for ensuring 100% network coverage for flooding in WSN secured with neighborhood keys and proposes an approximation algorithm for solving it.
Journal ArticleDOI
Security and privacy issues for the network of the future
Giannis F. Marias,Joao Barros,Markus Fiedler,Andreas Fischer,Harald Hauff,Ralph Herkenhoener,Antonio Grillo,Alessandro Lentini,Luisa Lima,Charlott Lorentzen,Wojciech Mazurczyk,Hermann de Meer,Paulo F. Oliveira,George C. Polyzos,Enric Pujol,Krzysztof Szczypiorski,Joao P. Vilela,Tiago T. V. Vinhoza +17 more
TL;DR: The security and privacy challenges of the Network of the Future are discussed and ways to delimit the solutions space on the basis of emerging techniques are reviewed in an effort to provide a more systematic and quantitative treatment of the area in the future.
Journal ArticleDOI
Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks
Luis Parrilla,Encarnación Castillo,J. A. López-Ramos,José Antonio Álvarez-Bermejo,Antonio García,Diego P. Morales +5 more
TL;DR: A compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented and allows securing wireless sensor networks with independence of the communications protocols used.
Patent
Method for operating a wireless sensor network
TL;DR: In this article, a method for operating a wireless sensor network, wherein the sensor network comprises a multitude of distributed sensor nodes for sensing data within a pre- definable environment, and where the sensor nodes can exchange information via encrypted data transmissions over a radio Channel is presented.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.