TelosB Implementation of Elliptic Curve Cryptography over Primary Field
نویسندگان
چکیده
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor network. We detail the implementation of Elliptic Curve Cryptography (ECC) over primary field, a public-key cryptography scheme, on TelosB, which is the latest research platform in Berkeley Motes family. We evaluate the performance of our implementation and compare with other implementations we have ported to TelosB. We have achieved 3.3 seconds for public key signature and 6.7 seconds for verification in our implementation even though the hardware multiplier is disabled.
منابع مشابه
TelosB Implementation of Elliptic Curve Cryptography over Primary Field WM-CS Technical Report (WM-CS-2005-12)
Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...
متن کاملElliptic curve cryptography-based access control in sensor networks
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfil the requirement, public-key cr...
متن کاملWM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملSoftware Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
The software implementation of cryptographic schemes for wireless sensor networks poses a challenge due to the limited capabilites of the platform. Nevertheless, its feasibility has been shown in recent papers. In this work we describe a software implementation of pairingbased cryptography and elliptic curve cryptography for the MSP430 microcontroller, which is used in some wireless sensors inc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005