作者: Ortal Arazi
DOI:
关键词: Elliptic curve cryptography 、 Authentication 、 Cryptography 、 Key (cryptography) 、 Computer science 、 Computer network 、 Sensor node 、 Group key 、 Public-key cryptography 、 Wireless sensor network
摘要: As sensor networks become one of the key technologies to realize ubiquitous computing, security remains a growing concern. Although wealth key-generation methods have been developed during past few decades, they cannot be directly applied network environments. The resource-constrained characteristics nodes, ad-hoc nature their deployment, and vulnerability wireless media pose need for unique solutions. A fundamental requisite achieving is ability provide data con dentiality node authentication. However, scarce resources rendered direct applicability existing public cryptography (PKC) methodologies impractical. Elliptic Curve Cryptography (ECC) has emerged as suitable cryptographic foundation constrained environments, providing strong relatively small sizes. This work focuses on clear resilient solutions in (WSNs) by introducing e¢ cient PKC methodologies, explicitly designed accommodate distinctive attributes networks. Primary contributions pertain introduction light-weight arithmetic operations, revision selfcerti cation (consolidated authentication key-generation). Moreover, low-delay group generation methodology devised denial service mitigation scheme introduced. system-level utilization Montgomery procedure calculations modular multiplicative inverses. With respect latter, computational complexity reduced from O(m) O(logm), with little additional memory cost. Complementing theoretical contributions, practical computation o¤-loading protocols along establishment scheme. Implementation state-ofthe-art platforms yielded comprehensive process obtained approximately 50 ns, while consuming less than 25mJ . These exciting results help demonstrate technology ensure its impact next-generation