• Corpus ID: 11724843

WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes

@inproceedings{Wang2007WMECCAE,
  title={WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes},
  author={Haodong Wang and Bo Sheng and Chiu Chiang Tan and Qun A. Li},
  year={2007}
}
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes th e ECC (Elliptic Curve Crytography) public-key cryptosystem implementation on the existing commercial sensor devices. We detail the… 
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control
TLDR
This paper builds the user access control on commercial off-the-shelf sensor devices as a case study to show that the public-key scheme can be more advantageous in terms of the memory usage, message complexity, and security resilience.
Providing DoS resistance for signature-based broadcast authentication in sensor networks
TLDR
This paper first presents two filtering techniques, the group- based filter and the key chain-based filter, to handle the DoS attacks against signature verification, and combines these two filters and proposes a hybrid solution to further improve the performance.
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks
TLDR
This paper presents two filtering techniques, a group- based filter and a key chain-based filter, to handle DoS attacks against signature verification, which can significantly reduce the number of unnecessary signature verifications that a sensor node has to perform.
Public-key based access control in sensornet
TLDR
A practical PKC-based access control for sensor networks, which consists of pairwise key establishment, local access control, and remote access control is proposed and is shown to be more advantageous than those built on symmetric cryptography in terms of the memory usage, message complexity, and security resilience.
SeNsIM-SEC: Security in Heterogeneous Sensor Networks
TLDR
A flexible wrapper to connect the whole system to the secured network is developed, and a performance analysis of the overhead introduced by security mechanisms is carried out, showing the feasibility of the proposed cryptosystem and the platform scalability and extensibility features.
Analysis of energy efficient ECC and TinySec based security schemes in Wireless Sensor Networks
  • S. Basu, M. Pushpalatha
  • Computer Science
    2013 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
  • 2013
TLDR
Analyzing the performance of certain common well known security schemes like TinySec, RC5, ECIES and ECDSA by implementing it in real time scenarios shows that the scheme works better than the common existent schemes and is also energy efficient as well as can conserve resources if used appropriately.
A Multi-user DoS-Containment Broadcast Authentication Scheme for Wireless Sensor Networks
  • Xian Gan, Qiaoliang Li
  • Computer Science
    2009 International Conference on Information Technology and Computer Science
  • 2009
TLDR
This paper presents a multi-user, signature-based broadcast authentication scheme with the capability of containing the Denial of Services attack, and proposes RRAS (Reputation-based Randomized Authentication Scheme) to contain the DoS attack.
Analysis and Comparison of Security Protocols in Wireless Sensor Networks
TLDR
This paper focuses on security problems related to the data exchange between sensor nodes and evaluates the performances of two dierent cryptosystems used to guarantee con- fidentiality, integrity and authentication requirements.
Design and implementation of a secure wireless mote-based medical sensor network
TLDR
This work proposes a novel two-tier scheme for verifying the authenticity of patient data, an ECC-based secure key exchange protocol to set up shared keys between sensor nodes and base stations, and symmetric encryption/decryption for protecting data confidentiality and integrity.
Combating dos attacks in wireless networks using lightweight key management schemes
The unique features of wireless networks lead to many attractive applications in both military and civilian operations. Wireless networking devices usually use batteries as power supply, which
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 17 REFERENCES
Efficient Implementation of Public Key Cryptosystems on MIC Az and TelosB Motes
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptog raphy is more flexible and simple rendering a
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
TLDR
The implementation of the RSA and ECC public-key cryptosystem on Berkeley Motes achieves the performance of 0.79s for RSA public key operation and 21.5s for private operation, and 1.3s for ECC signature generation and 2.8s for verification.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
  • D. Malan, M. Welsh, Michaela Smith
  • Computer Science
    2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.
  • 2004
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
  • An Liu, P. Ning
  • Computer Science
    2008 International Conference on Information Processing in Sensor Networks (ipsn 2008)
  • 2008
TLDR
TinyECC is presented, a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications and shows the impacts of individual optimizations on the execution time and resource consumptions.
Elliptic curve cryptography-based access control in sensor networks
TLDR
Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network and details the implementation of Elliptic Curve Cryptography over primary field on TelosB, which is the latest sensor network platform.
Guide to Elliptic Curve Cryptography
TLDR
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
TLDR
To accelerate multiple-precision multiplication, a new algorithm to reduce the number of memory accesses is proposed and implemented elliptic curve point multiplication for 160-bit, 192- bit, and 224-bit NIST/SECG curves over GF(p), RSA-1024 and RSA-2048 on two 8-bit microcontrollers.
Distributed User Access Control in Sensor Networks
TLDR
This paper proposes a distributed user access control under a realistic adversary model in which sensors can be compromised and user may collude, and implements the access control protocols on a testbed of TelosB motes.
Efficient elliptic curve exponentiation
TLDR
This paper investigates how to implement elliptic curve cryptosystems on E/IFp, which can be constructed over a smaller definition field than the ElGamal cryptos system or the RSA cryptosSystems.
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
TLDR
A new coordinate system and a new mixed coordinates strategy are proposed, which significantly improves on the number of basic operations needed for elliptic curve exponentiation.
...
1
2
...