Self-Certified Public Key Cryptographic Methodologies for Resource-Constrained Wireless Sensor Networks

作者: Ortal Arazi

DOI:

关键词: Elliptic curve cryptographyAuthenticationCryptographyKey (cryptography)Computer scienceComputer networkSensor nodeGroup keyPublic-key cryptographyWireless sensor network

摘要: As sensor networks become one of the key technologies to realize ubiquitous computing, security remains a growing concern. Although wealth key-generation methods have been developed during past few decades, they cannot be directly applied network environments. The resource-constrained characteristics nodes, ad-hoc nature their deployment, and vulnerability wireless media pose need for unique solutions. A fundamental requisite achieving is ability provide data con…dentiality node authentication. However, scarce resources rendered direct applicability existing public cryptography (PKC) methodologies impractical. Elliptic Curve Cryptography (ECC) has emerged as suitable cryptographic foundation constrained environments, providing strong relatively small sizes. This work focuses on clear resilient solutions in (WSNs) by introducing e¢ cient PKC methodologies, explicitly designed accommodate distinctive attributes networks. Primary contributions pertain introduction light-weight arithmetic operations, revision selfcerti…cation (consolidated authentication key-generation). Moreover, low-delay group generation methodology devised denial service mitigation scheme introduced. system-level utilization Montgomery procedure calculations modular multiplicative inverses. With respect latter, computational complexity reduced from O(m) O(logm), with little additional memory cost. Complementing theoretical contributions, practical computation o¤-loading protocols along establishment scheme. Implementation state-ofthe-art platforms yielded comprehensive process obtained approximately 50 ns, while consuming less than 25mJ . These exciting results help demonstrate technology ensure its impact next-generation

参考文章(46)
Mike Burmester, Yvo Desmedt, A secure and efficient conference key distribution system theory and application of cryptographic techniques. pp. 275- 286 ,(1994) , 10.1007/BFB0053443
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
Brian J. Matt, David W. Carman, Peter S. Kruus, CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY ,(2000)
Stephen R. Dussé, Burton S. Kaliski, A cryptographic library for the Motorola DSP56000 theory and application of cryptographic techniques. pp. 230- 244 ,(1991) , 10.1007/3-540-46877-3_21
Dan Boneh, Nagendra Modadugu, Michael Kim, Generating RSA Keys on a Handheld Using an Untrusted Server international conference on progress in cryptology. pp. 271- 282 ,(2000) , 10.1007/3-540-44495-5_24
Ratna Dutta, Rana Barua, Palash Sarkar, Provably Secure Authenticated Tree Based Group Key Agreement international conference on information and communication security. pp. 92- 104 ,(2004) , 10.1007/978-3-540-30191-2_8
Neal Koblitz, Alfred Menezes, Scott Vanstone, The State of Elliptic Curve Cryptography public key cryptography. ,vol. 19, pp. 173- 193 ,(2000) , 10.1023/A:1008354106356
Mike Just, Serge Vaudenay, Authenticated Multi-Party Key Agreement international cryptology conference. ,vol. 1163, pp. 36- 49 ,(1996) , 10.1007/BFB0034833
Tudor Jebelean, An algorithm for exact division Journal of Symbolic Computation. ,vol. 15, pp. 169- 180 ,(1993) , 10.1006/JSCO.1993.1012