Peter Langendörfer

Learn More
In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks. We investigate four types of nodes; MICA2DOT, MICA2, MICAz and TelosB. For all these nodes we estimate the power consumption for most common RSA and ECC operations, i.e., signature generation and verification as(More)
Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. In(More)
This paper discuss two ways to provide flexible hardware support for the reduction step in elliptic curve cryptography in binary fields (GF(2<sup>m</sup>)). In the first approach the authors are using several dedicated reduction units within a single multiplier. The measurement results show that this simple approach leads to an additional area consumption(More)
In this paper we present a case study for a design of a reliable body area network (BAN) for monitoring fire fighter rescue teams according to the requirements defined by the Berlin fire brigades. This case study considers all layers of the system, starting from the hardware, going through the operating system and data handling middleware, ending at the(More)
In this paper we discuss the idea of combining wireless sensor networks and cloud computing starting with a state of the art analysis of existing approaches in this field. As result of the analysis we propose to reflect a real wireless sensor network by virtual sensors in the cloud. The main idea is to replicate data stored on the real sensor nodes also in(More)
Privacy issues are becoming more and more important especially since the cyber and the real world are converging up to certain extent when using mobile devices. Means that really protect privacy are still missing. The problem is, as soon as a user provides data to a service provider the user looses control over her data. The simple solution is not to(More)
Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very beneficial for issues such as key distribution, authentication etc. In the recent years first research groups started to cope with the challenges applying PKC in resource-constrained(More)
The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes, criminal or terrorist attacks against CIs are increasingly reported. The large-scale nature of CIs requires a scalable and low-cost technology for improving CI monitoring and surveillance. WSNs are a(More)
Concerns of users about the privacy of their data are becoming more important to providers of online services, as they develop into a major barrier for broad acceptance of applications, that gather data about their users. With P3P there exists a standard that, in the context of web-based applications, gives users some control over the gathering, use and(More)