메뉴 건너뛰기




Volumn 5746 LNCS, Issue , 2009, Pages 112-127

Energy-efficient implementation of ECDH key exchange for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC STRUCTURES; APRIORI; BASE POINTS; CLOCK CYCLES; CRYPTOGRAPHIC KEY; DIFFIE HELLMAN; EFFICIENT IMPLEMENTATION; ELLIPTIC CURVE; ENERGY EFFICIENT; ENVIRONMENTAL SURVEILLANCE; HOME AUTOMATION; HOSTILE ENVIRONMENTS; KEY EXCHANGE; MALICIOUS ATTACK; MICAZ MOTES; PRIME FIELD; RESOURCE CONSTRAINT; SCALAR MULTIPLICATION; SECURITY SERVICES; SHARED SECRETS; TINYOS OPERATING SYSTEM; ZIG-BEE; WIRELESS SENSOR NETWORK (WSNS);

EID: 70350585044     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03944-7_9     Document Type: Conference Paper
Times cited : (45)

References (44)
  • 1
    • 70350600372 scopus 로고    scopus 로고
    • 8-bit ARVR® Instruction Set
    • Atmel Corporation, July 2008
    • Atmel Corporation. 8-bit ARVR® Instruction Set. User Guide (July 2008), http://www.atmel.com/dyn/resources/prod-documents/doc0856.pdf
    • User Guide
  • 2
    • 70350603296 scopus 로고    scopus 로고
    • 8-bit ARVR® Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L
    • Atmel Corporation, June 2008
    • Atmel Corporation. 8-bit ARVR® Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet (June 2008), http://www.atmel.com/dyn/resources/prod-documents/doc2467.pdf
    • Datasheet
  • 3
    • 33745855808 scopus 로고    scopus 로고
    • Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, 3934, pp. 104-118. Springer, Heidelberg (2006)
    • Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104-118. Springer, Heidelberg (2006)
  • 4
    • 33749408128 scopus 로고    scopus 로고
    • Efficient implementation of elliptic curve cryptography for wireless sensor networks
    • Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany March
    • Blaß, E.-O., Zitterbart, M.: Efficient implementation of elliptic curve cryptography for wireless sensor networks. Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany (March 2005), http://doc.tm.uka.de/2005/tm-2005-1.pdf
    • (2005)
    • Blaß, E.-O.1    Zitterbart, M.2
  • 5
    • 85028765277 scopus 로고    scopus 로고
    • Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, 740, pp. 471-486. Springer, Heidelberg (1993)
    • Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471-486. Springer, Heidelberg (1993)
  • 6
    • 18144374315 scopus 로고    scopus 로고
    • 10 emerging technologies that will change the world
    • Brody, H.: 10 emerging technologies that will change the world. Technology Review 106(1), 33-49 (2003)
    • (2003) Technology Review , vol.106 , Issue.1 , pp. 33-49
    • Brody, H.1
  • 7
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103-105 (2003)
    • (2003) Computer , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 10
  • 11
    • 70350608993 scopus 로고    scopus 로고
    • Crossbow Technology, Inc.MICAzWireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
    • Crossbow Technology, Inc.MICAzWireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
  • 12
    • 70350585617 scopus 로고    scopus 로고
    • Security in wireless mobile and sensor networks
    • Guizani, M, ed, ch. 18, pp, Springer, Heidelberg
    • Das, S.K., Agah, A., Basu, K.: Security in wireless mobile and sensor networks. In: Guizani, M. (ed.) Wireless Communications Systems and Networks, ch. 18, pp. 531-557. Springer, Heidelberg (2004)
    • (2004) Wireless Communications Systems and Networks , pp. 531-557
    • Das, S.K.1    Agah, A.2    Basu, K.3
  • 18
    • 27344450097 scopus 로고    scopus 로고
    • Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 75-90. Springer, Heidelberg (2005)
    • Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 75-90. Springer, Heidelberg (2005)
  • 19
    • 33750709739 scopus 로고    scopus 로고
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 133-147. Springer, Heidelberg (2004)
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
  • 21
    • 35048818581 scopus 로고    scopus 로고
    • Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 119-132. Springer, Heidelberg (2004)
    • Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
  • 23
    • 70350579484 scopus 로고    scopus 로고
    • Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive
    • Report 2008/442
    • Kargl, A., Pyka, S., Seuschek, H.: Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008/442 (2008), http://eprint.iacr.org
    • (2008)
    • Kargl, A.1    Pyka, S.2    Seuschek, H.3
  • 24
    • 0003899818 scopus 로고
    • Version 5, Internet Engineering Task Force, Network Working Group, RFC 1510 September
    • Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Internet Engineering Task Force, Network Working Group, RFC 1510 (September 1993)
    • (1993) The Kerberos Network Authentication Service
    • Kohl, J.T.1    Neuman, B.C.2
  • 26
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Jajodia, S, Atluri, V, Jaeger, T, eds, ACM Press, New York
    • Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52-61. ACM Press, New York (2003)
    • (2003) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 27
    • 58649109885 scopus 로고    scopus 로고
    • Security for Wireless Sensor Networks
    • Springer, Heidelberg
    • Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security, vol. 28. Springer, Heidelberg (2006)
    • (2006) Advances in Information Security , vol.28
    • Liu, D.1    Ning, P.2
  • 31
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 32
    • 70350615129 scopus 로고    scopus 로고
    • ON World, Inc. WSN for smart homes, February
    • ON World, Inc. WSN for smart homes. Market Dynamics Report (February 2008)
    • (2008) Market Dynamics Report
  • 35
    • 70350611497 scopus 로고    scopus 로고
    • Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org
    • Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org
  • 36
    • 68149165367 scopus 로고    scopus 로고
    • m) on 8-bit Micaz mote. IEICE Transactions on Information and Systems E91-D(5), 1338-1347 (2008)
    • m) on 8-bit Micaz mote. IEICE Transactions on Information and Systems E91-D(5), 1338-1347 (2008)
  • 38
    • 49949100301 scopus 로고    scopus 로고
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, 4913, pp. 305-320. Springer, Heidelberg (2008)
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
  • 39
    • 70350617038 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
    • Wolf, T, Parameswaran, S, eds
    • Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS , pp. 11-16
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 40
    • 37149040069 scopus 로고    scopus 로고
    • Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, 4572, pp. 73-86. Springer, Heidelberg (2007)
    • Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 73-86. Springer, Heidelberg (2007)
  • 41
    • 85008955601 scopus 로고    scopus 로고
    • Efficient Implementation of Public Key Cryptosystems on Mote Sensors
    • Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
    • Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on Mote Sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 519-528
    • Wang, H.1    Li, Q.2
  • 42
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(11/12), 2314-2341 (2007)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 44
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
    • IEEE Computer Society Press, Los Alamitos
    • Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326-335. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP , pp. 326-335
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.