6 Conclusion
This work concludes that public-key cryptography is possible in sensor networks –
quite contrary to popular related work. Existing security protocols for sensor networks
detouring asymmetric primitives with complicated symmetric constructs have to be re-
considered as there is now the chance to develop new security protocols for sensor
networks which might be based on more elegant asymmetric or hybrid techniques. The
key for efficiency in our work are memory optimizations as well as a precomputation
of base points for faster execution.
This does of course not solve the general trust or key bootstrapping problem in
sensor networks, i.e. how to initially distribute trust or keys in an ad-hoc formed net-
work without (public-key) infrastructures. But future work can now tackle this problem
without turning public key cryptography aside.
References
1. Malan D. J., Welsh, M., Smith, M. D.: A Public-Key Infrastructure for Key Distribution in
TinyOS Based on Elliptic Curve Cryptography. First IEEE International Conference on Sensor
and Ad Hoc Communications and Networks, 2004
2. Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Transactions on Informa-
tion Theory, 1976
3. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, S.: Embedded End-
to-End Wireless Security with ECDH Key Exchange. The 46th IEEE Midwest Symposium
On Circuits and Systems, 2003.
4. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. 10th Computer
and Communications Security, 2003
5. Huang Q., Cukier J., Kobayashi, H., Liu B., Zhang, J.: Fast Authenticated Key Establishment
Protocols for Self-Organizing Sensor Networks. International Conference on Wireless Sensor
Networks and Applications, 2003
6. Huang Q., Kobayashi, H.: Energy/security scalable mobile cryptosystem. IEEE Personal, In-
door and Mobile Radio Communications, 2003
7. Certicom: Press Release – Certicom Announces Elliptic Curve Cryptosystem (ECC) Chal-
lenge Winner, 1997
http://www.certicom.com
8. Lenstra, A. K., Verheul, E. R.: Selecting Cryptographic Key Sizes. Journal of Cryptology: the
journal of the International Association for Cryptologic Research, 2001
9. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation, Vol. 48, 1987
10. Weimerskirch, A., Westhoff, D.: Identity Certified Authentication for Ad-hoc Networks. 10th
Workshop on Security of Ad Hoc and Sensor Networks, 2003
11. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in
adhoc wireless networks. Symposium on Network and Distributed Systems Security, 2002
12. Anderson, R., Bergadano F., Crispo, B., Lee, J., Manifavas C., Needham R.: A New Family
of Authentication Protocols. ACMOSR: ACM Operating Systems Review, 1998
13. El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete loga-
rithms. Proceedings of CRYPTO 84 on Advances in cryptology, 1985
14. Federal Information Processing Standards Publication 186: Digital Signature Standard
(DSS). National Institute of Standards and Technology, 1994
15. University of California Berkeley: Tiny OS Hardware Designs, 2004
http://www.tinyos.net/scoop/special/hardware
93