Towards Acceptable Public-Key Encryption in Sensor Networks
Erik-Oliver Blaß, Martina Zitterbart
2005
Abstract
One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2[15] platform. To our knowledge this implementation is the first to offer acceptable encryption speed while providing adequate security in sensor networks.
References
- Malan D. J., Welsh, M., Smith, M. D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004
- Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Transactions on Information Theory, 1976
- Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, S.: Embedded Endto-End Wireless Security with ECDH Key Exchange. The 46th IEEE Midwest Symposium On Circuits and Systems, 2003.
- Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. 10th Computer and Communications Security, 2003
- Huang Q., Cukier J., Kobayashi, H., Liu B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. International Conference on Wireless Sensor Networks and Applications, 2003
- Huang Q., Kobayashi, H.: Energy/security scalable mobile cryptosystem. IEEE Personal, Indoor and Mobile Radio Communications, 2003
- Certicom: Press Release - Certicom Announces Elliptic Curve Cryptosystem (ECC) Challenge Winner, 1997 http://www.certicom.com
- Lenstra, A. K., Verheul, E. R.: Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 2001
- Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation, Vol. 48, 1987
- Weimerskirch, A., Westhoff, D.: Identity Certified Authentication for Ad-hoc Networks. 10th Workshop on Security of Ad Hoc and Sensor Networks, 2003
- Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. Symposium on Network and Distributed Systems Security, 2002
- Anderson, R., Bergadano F., Crispo, B., Lee, J., Manifavas C., Needham R.: A New Family of Authentication Protocols. ACMOSR: ACM Operating Systems Review, 1998
- El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. Proceedings of CRYPTO 84 on Advances in cryptology, 1985
- Federal Information Processing Standards Publication 186: Digital Signature Standard (DSS). National Institute of Standards and Technology, 1994
- University of California Berkeley: Tiny OS Hardware Designs, 2004 http://www.tinyos.net/scoop/special/hardware
Paper Citation
in Harvard Style
Blaß E. and Zitterbart M. (2005). Towards Acceptable Public-Key Encryption in Sensor Networks . In Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005) ISBN 972-8865-24-4, pages 88-93. DOI: 10.5220/0002563200880093
in Bibtex Style
@conference{iwuc05,
author={Erik-Oliver Blaß and Martina Zitterbart},
title={Towards Acceptable Public-Key Encryption in Sensor Networks},
booktitle={Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)},
year={2005},
pages={88-93},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002563200880093},
isbn={972-8865-24-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)
TI - Towards Acceptable Public-Key Encryption in Sensor Networks
SN - 972-8865-24-4
AU - Blaß E.
AU - Zitterbart M.
PY - 2005
SP - 88
EP - 93
DO - 10.5220/0002563200880093