User menu

Energy-efficient implementation of ECDH key exchange for Wireless Sensor Networks

Bibliographic reference Lederer, C. ; Mader, R. ; Koschuch, M. ; Grossscha uml dl, J. ; Szekely, A. ; et. al. Energy-efficient implementation of ECDH key exchange for Wireless Sensor Networks.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 112-127
Permanent URL http://hdl.handle.net/2078.1/67509
  1. Atmel Corporation. 8-bit ARV® Instruction Set. User Guide (July 2008), http://www.atmel.com/dyn/resources/prod_documents/doc0856.pdf
  2. Atmel Corporation. 8-bit ARV® Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet (June 2008), http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
  3. Becher Alexander, Benenson Zinaida, Dornseif Maximillian, Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks, Security in Pervasive Computing (2006) ISBN:9783540333760 p.104-118, 10.1007/11734666_9
  4. Blaß, E.-O., Zitterbart, M.: Efficient implementation of elliptic curve cryptography for wireless sensor networks. Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany (March 2005), http://doc.tm.uka.de/2005/tm-2005-1.pdf
  5. Blundo Carlo, De Santis Alfredo, Herzberg Amir, Kutten Shay, Vaccaro Ugo, Yung Moti, Perfectly-Secure Key Distribution for Dynamic Conferences, Advances in Cryptology — CRYPTO’ 92 (1993) ISBN:9783540573401 p.471-486, 10.1007/3-540-48071-4_33
  6. Brody, H.: 10 emerging technologies that will change the world. Technology Review 106(1), 33–49 (2003)
  7. Haowen Chan, Perrig A., Security and privacy in sensor networks, 10.1109/mc.2003.1236475
  8. Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM 2005), vol. 1, pp. 524–535. IEEE, Los Alamitos (2005)
  9. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 24th IEEE Symposium on Security and Privacy (S&P 2003), pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)
  10. Conti J.P., The Internet of things, 10.1049/ce:20060603
  11. Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf
  12. Das Sajal K., Agah Afrand, Basu Kalyan, Security in Wireless Mobile and Sensor Networks, Wireless Communications Systems and Networks ISBN:0306481901 p.531-557, 10.1007/0-306-48642-3_18
  13. de Meulenaer Giacomo, Gosset François, Standaert François-Xavier, Pereira Olivier, On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 10.1109/wimob.2008.16
  14. Diffie W., Hellman M., New directions in cryptography, 10.1109/tit.1976.1055638
  15. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 62–72. ACM Press, New York (2003)
  16. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 41–47. ACM Press, New York (2002)
  17. Furbass Franz, Wolkerstorfer Johannes, ECC Processor with Low Die Size for RFID Applications, 10.1109/iscas.2007.378271
  18. Großschädl Johann, Avanzi Roberto M., Savaş Erkay, Tillich Stefan, Energy-Efficient Software Implementation of Long Integer Modular Arithmetic, Cryptographic Hardware and Embedded Systems – CHES 2005 (2005) ISBN:9783540284741 p.75-90, 10.1007/11545262_6
  19. Großschädl Johann, Savaş Erkay, Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ), Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.133-147, 10.1007/978-3-540-28632-5_10
  20. Großschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: Deng, R.H., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 380–382. ACM Press, New York (2007)
  21. Gura Nils, Patel Arun, Wander Arvinderpal, Eberle Hans, Shantz Sheueling Chang, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.119-132, 10.1007/978-3-540-28632-5_9
  22. Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
  23. Kargl, A., Pyka, S., Seuschek, H.: Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008/442 (2008), http://eprint.iacr.org
  24. Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Internet Engineering Task Force, Network Working Group, RFC 1510 (September 1993)
  25. Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245–256. IEEE Computer Society Press, Los Alamitos (2008)
  26. Liu Donggang, Ning Peng, Establishing pairwise keys in distributed sensor networks, 10.1145/948109.948119
  27. Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security, vol. 28. Springer, Heidelberg (2006)
  28. Lopez, J., Zhou, J.: Wireless Sensor Network Security. Cryptology and Information Security Series, vol. 1. IOS Press, Amsterdam (2008)
  29. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71–80. IEEE, Los Alamitos (2004)
  30. National Institute of Standards and Technology (NIST). Recommended Elliptic Curves for Federal Government Use (July 1999), http://csrc.nist.gov/encryption/dss/ecdsa/NISTReCur.pdf
  31. Needham Roger M., Schroeder Michael D., Using encryption for authentication in large networks of computers, 10.1145/359657.359659
  32. ON World, Inc. WSN for smart homes. Market Dynamics Report (February 2008)
  33. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 189–199. ACM Press, New York (2001)
  34. Piotrowski Krzysztof, Langendoerfer Peter, Peter Steffen, How public key cryptography influences wireless sensor node lifetime, 10.1145/1180345.1180366
  35. Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org
  36. SEO S. C., HAN D.-G., KIM H. C., HONG S., TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote, 10.1093/ietisy/e91-d.5.1338
  37. Wireless Sensor Networks, ISBN:9780470061794, 10.1002/9780470061794
  38. Szczechowiak Piotr, Oliveira Leonardo B., Scott Michael, Collier Martin, Dahab Ricardo, NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks, Lecture Notes in Computer Science ISBN:9783540776895 p.305-320, 10.1007/978-3-540-77690-1_19
  39. Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11–16 (2007), http://arxiv.org/abs/0903.3900
  40. Uhsadel Leif, Poschmann Axel, Paar Christof, Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes, Security and Privacy in Ad-hoc and Sensor Networks ISBN:9783540732747 p.73-86, 10.1007/978-3-540-73275-4_6
  41. Wang Haodong, Li Qun, Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper), Information and Communications Security (2006) ISBN:9783540494966 p.519-528, 10.1007/11935308_37
  42. Xiao Yang, Rayi Venkata Krishna, Sun Bo, Du Xiaojiang, Hu Fei, Galloway Michael, A survey of key management schemes in wireless sensor networks, 10.1016/j.comcom.2007.04.009
  43. Yan, H., Shi, Z.J.: Studying software implementations of elliptic curve cryptography. In: Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG 2006), pp. 78–83. IEEE Computer Society Press, Los Alamitos (2006)
  44. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326–335. IEEE Computer Society Press, Los Alamitos (2003)