A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
David J. Malan,Matt Welsh,Michael D. Smith +2 more
- pp 71-80
Reads0
Chats0
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.Abstract:
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley's TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, there has remained a need for an efficient, secure mechanism for distribution of secret keys among nodes. Although public-key infrastructure has been thought impractical, we argue, through analysis of our own implementation for TinyOS of multiplication of points on elliptic curves, that public-key infrastructure is, in fact, viable for TinySec keys' distribution, even on the MICA2. We demonstrate that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.read more
Citations
More filters
Journal ArticleDOI
Ensuring Confidentiality in the Cloud of Things
TL;DR: This work summarizes experiences gathered while transitioning this vision for confidentiality-preserving CoT to practice for processing continuous queries on streams of sensitive data generated by IoT devices.
Proceedings ArticleDOI
Mobile Assisted Key Distribution in Wireless Sensor Networks
Baris Tas,Ali Saman Tosun +1 more
TL;DR: In proposed schemes, mobile robot handles all the overload of key distribution requiring minimal resources at the sensors for key management, which can provide a comprehensive key management framework that can also aid in detection of compromised nodes and do key revocation.
Journal ArticleDOI
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
TL;DR: It is demonstrated that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics.
Proceedings ArticleDOI
IBE-Trust: A security framework for Wireless Sensor Networks
TL;DR: An IBE-Trust security framework utilizing the well-known identity based encryption scheme not to only establish secure communications but to ensure the trustworthiness of the communication between sensor nodes and base station is presented.
Book ChapterDOI
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network
Yoon-Su Jeong,Sang-Ho Lee +1 more
TL;DR: The proposed efficient hybrid key establishment protocol for sensor network self-organized with equal distribution between sensor nodes is applicable to distributed environment with expansional aspect without control of base station, combining with elliptic curve Diffie-Hellman key establishment with implicated certificate and symmetric key encryption technology.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI
Use of Elliptic Curves in Cryptography
TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Proceedings ArticleDOI
SPINS: security protocols for sensor networks
TL;DR: A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.