Learn More
By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility, however, does not necessarily mean attractiveness, as the obtained results are still not satisfactory enough. In this paper, we present results on implementing ECC, as well as the(More)
Wireless Sensor Networks (WSNs) have emerged as a new monitoring and control solution for a variety of applications. Although the behavior of a WSN is characterized by the type of its application, a common element exist: faults are a normal fact, not isolated events as in traditional networks. Thus, in order to guarantee the network quality of service it is(More)
In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: Abstract Clustered sensor networks have recently been shown to increase system(More)
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. Recent work has shown that clustered sensor networks can increase system throughput, decrease system delay, and save energy. In this paper, we show that random key pre-distribution, first proposed and(More)
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and(More)
After a few years of intense research, Wireless Sensor Networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryp-tosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz(More)
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not.(More)
The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents the implementation of elliptic curve cryptography in the MICAz Mote, a popular sensor platform. We present optimization techniques for arithmetic in binary fields,(More)
Mobile Ad hoc Networks (MANETs) and Peer-to-Peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infrastructure and the demand for applications that share files or distribute processing through the Internet, MANETs(More)
— Mobile Ad-Hoc Networks (MANETs) and Peer-to-Peer (P2P) applications are emerging technologies based on the same paradigm: the Peer-to-Peer paradigm. Motivated, respectively , by the necessity of executing applications in environments with no previous infrastructure and the demand for applications that share, in a satisfying manner, files through the(More)