Sensor Network Security: Elliptic Curve Cryptography on SunSPOTs

نویسندگان

  • Jens Mache
  • Samuel W. Bock
  • James Elwell
  • Dennis P. Gosnell
  • Travis Mandel
  • Jonathan S. Perry-Houts
چکیده

Security is critical for wireless sensor networks. While several security mechanisms and protocols have been developed in the context of the Internet, many new challenges arise due to the characteristics of power-constrained wireless sensor networks. In this work, we focus on the Javaprogrammable SunSPOT device and elliptic curve cryptography (ECC). We present an analysis of run times and energy consumption. For our studies, we have developed our own implementation based on published pseudocode and Sun's BigInteger class. Our point multiplication on elliptic curves in prime finite fields is faster than that of Bouncy Castle, an open source ECC implementation. We investigate the impact of various parameters including key size, nonadjacent form, and prime versus binary fields. We believe such investigations to be an important step towards addressing the challenges of energy efficient security for Java-based sensor networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Secure Routing Based on ECC in Cluster Wireless Sensor Networks

wireless sensors having limited capabilities, because of these factors sensors possess huge attacks like sinkhole, worm hole, Sybil, flooding, etc. a lot of research work already done, but no one implemented secure routing protocol to mitigate all these attacks. Some proposals came on security of wireless sensor network which controlled only one or two attacks. We proposed Secure Routing in Clu...

متن کامل

Elliptic curve cryptography-based access control in sensor networks

Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfil the requirement, public-key cr...

متن کامل

An Optimal Approach for Secure and Energy Efficient Data Transfer in WSN using Hierarchical and Dynamic Elliptic Curve Cryptosystem

In Wireless Sensor Networks (WSN), the wireless connections are prone to different type of attacks. Therefore, security of the data that transfer over the wireless network is a measure concern in WSN. Due to the limitation of nodes’ energy, efficient energy utilization is also an important factor. Hence to provide security along with efficient energy utilization of sensor nodes, Secure and Ener...

متن کامل

An Efficient Node Authentication Scheme based on Elliptic Curve Cryptography for Wireless Sensor Networks

Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the energy efficiency while guarantee the required commu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008