Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks
نویسندگان
چکیده
A comparative study of hardware implementations of Elliptic Curve Cryptography (ECC) in Wireless Sensor Networks (WSN) is presented in this paper. The study covers important parameters like the underlying finite field, representation basis, occupied chip area, consumed power, and time performances of these implementations. Additionally, most of the reviewed implementations were implemented on Application Specific Integrated Circuits (ASIC) and only one was implemented on Field Programmable Gate Array (FPGA). Likewise, most of these implementations were implemented over the binary fields GF(2) and using polynomial basis
منابع مشابه
A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN
Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN). Make available these two services by using symmetric cryptosystems in software implementation are challenging that’s not providing a perfect trade-off between resilience and performance. Asymmetric approaches with public key cryptosystems, specifically Ellipti...
متن کاملAchieving robust message authentication in sensor networks: a public-key based approach
Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting n...
متن کاملA Survey on Hardware Implementations of Elliptic Curve Cryptosystems
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field ...
متن کاملImplementation and Evaluation of BSD Elliptic Curve Cryptography
Security is recently arising as an important issue for the Internet of Things (IoT). Efficient ways to provide secure communication between devices and sensors is crucial for the IoT devices, which are becoming more and more used and spread in a variety of fields. In this context, Elliptic Curve Cryptography (ECC) is considered as a strong candidate to provide security while being able to be fu...
متن کاملEncryption and Key Exchange in Wireless Sensor Networks
Encryption and key distribution are important primitives to build secure Wireless Sensor Networks (WSN). Different block ciphers were proposed in literature to provide encryption in resource constraint distributed networks. A large amount of different key distribution schemes were implemented, targeting different types of WSNs. These schemes face issues with respect to their requirements, imple...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012