scispace - formally typeset
Journal ArticleDOI

MONET special issue on next generation hardware architectures for secure mobile computing

Reads0
Chats0
TLDR
This special issue aims to present recent advances in cryptographic hardware architectures for secure mobile computing, and illustrates the possibilities of using ECC to provide strong security for mobile computing applications.
Abstract
Security is of paramount importance to the design of modern communication systems and in particular, to wireless networks. Wireless devices are becoming commonplace in both the office and home environment and therefore, the need for strong secure transport protocols is one of the most important issues in mobile standards. Cryptography is the foremost method for providing communication security and is a mathematically intensive process which, to date, has mainly been implemented in software. However, such methods are slow and cannot cope with the demands of rapidly growing real-time wireless communication systems. Encryption of digital information in real-time holds the key to the successful growth of applications such as wireless hand-held devices and high performance mobile communications. The innovative mapping of complex cryptographic operations onto hardware architectures with consideration for throughput, area and power issues has emerged as a viable solution. This special issue aims to present recent advances in cryptographic hardware architectures for secure mobile computing. The majority of the accepted papers focus on the challenge of designing high-speed asymmetric cryptographic hardware architectures for mobile applications. Asymmetric techniques are, in general, more complex than symmetric cryptographic methods and as such, it is inevitably more difficult to design efficient low resource, high-speed asymmetric architectures. The most common and best known asymmetric scheme is the RSA algorithm, but hardware implementations of RSA can require tens of thousands of gates. A much more promising asymmetric security solution is elliptic curve cryptography (ECC). ECC is viewed as a low-cost alternative to RSA and provides similar security strengths using much shorter key lengths. The research described in the contributions to this special issue illustrate the possibilities of using ECC to provide strong security for mobile computing applications. The first paper, ‘A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes’, by Roman, Alcaraz and Lopez surveys existing research into hardware and software cryptographic implementations for wireless sensor networks. They conclude that while existing sensor nodes can support software security implementations, next generation sensor nodes will be able to support hardware security architectures of more complex asymmetric cryptographic algorithms. The next three papers describe high-speed ECC processor architectures. Sakiyama, Batina, Preneel and Verbauwhede’s paper, ‘High-Performance Public-Key Cryptoprocessor for Wireless Mobile Applications’, presents an ECC processor hardware architecture that exploits parallel processing of the modular operations in the arithmetic logic unit, in addition to instruction-level parallelism to achieve a high overall Mobile Netw Appl (2007) 12:229–230 DOI 10.1007/s11036-007-0023-3

read more

Citations
More filters

Aggregation algorithms in a vehicle-to-vehicle-to-infrastructure (V2V2I) intelligent transportation system architecture

J Miller
TL;DR: The super vehicle detection (SVD) algorithm for how a vehicle can find or become a super vehicle of a zone and how super vehicles can aggregate the speed and location data from all of the vehicles within their zone to still ensure an accurate representation of the network are described.
Proceedings ArticleDOI

Vehicle-to-vehicle-to-infrastructure (V2V2I) intelligent transportation system architecture

TL;DR: In this paper, the authors describe the V2V2I architecture, which is a hybrid of the vehicle-to-vehicle (V2V) and V2I architectures, and perform an analysis using FreeSim to determine the trade-offs experienced based on the size and number of zones within a transportation network.
Proceedings ArticleDOI

Comparing the GPS capabilities of the Samsung Galaxy S, Motorola Droid X, and the Apple iPhone for vehicle tracking using FreeSim_Mobile

TL;DR: The case study furthers the feasibly that mobile phones can act as an alternative means for probe vehicles as the iPhone 4 and Motorola Droid X are relatively as accurate as a vehicle tracking device.
Proceedings ArticleDOI

Comparing the GPS capabilities of the iPhone 4 and iPhone 3G for vehicle tracking using FreeSim_Mobile

TL;DR: In this article, a comparison between the Apple iPhone 3G and the iPhone 4 was made using the real-time vehicle tracking application FreeSim_Mobile. The results showed that the 3G had an average error factor of 4.94% from the actual time to traverse the section of roadway (as determined by the stopwatch).
Proceedings ArticleDOI

FreeSim_Mobile: A novel approach to real-time traffic gathering using the apple iPhone™

TL;DR: A preliminary application for the iPhone™ that uses the built-in GPS receiver along with the web capabilities utilizing a V2I architecture to send a continuous flow of data to a central server where FreeSim, a real-time traffic simulator, applies the proportional model algorithm to determine the time to traverse a roadway in order to report in real- time the current flow of traffic.
Related Papers (5)