메뉴 건너뛰기




Volumn 156, Issue 2, 2009, Pages 394-405

On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks

Author keywords

Cryptography; Elliptic Curve Cryptography; Java; Resource consumption; Security; Wireless Sensor Network

Indexed keywords

ALTERNATIVE METHODS; APPLICATION DEVELOPMENT ENVIRONMENT; APPLICATION LAYERS; CROSS-LAYER; CRYPTOSYSTEMS; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; INDUSTRY STANDARDS; JAVA; NETWORK LIFETIME; PROGRAMMABLE OBJECTS; PROGRAMMABLE PLATFORMS; PUBLIC KEY CRYPTOSYSTEMS; REAL APPLICATIONS; RESOURCE CONSUMPTION; SECURITY ARCHITECTURE; SUN MICROSYSTEMS; TRANSPORT LAYER SECURITY; WIRELESS SENSOR;

EID: 71649100806     PISSN: 09244247     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sna.2009.10.012     Document Type: Article
Times cited : (14)

References (42)
  • 2
    • 27444438367 scopus 로고    scopus 로고
    • Sensor Networks: An Overview
    • Technical Report, Department of Computer Science, University of California, Davis
    • A. Bharathidasan, V. Anand, S. Ponduru, Sensor Networks: An Overview, Technical Report, Department of Computer Science, University of California, Davis, 2001.
    • (2001)
    • Bharathidasan, A.1    Anand, V.2    Ponduru, S.3
  • 3
    • 71649104304 scopus 로고    scopus 로고
    • Crossbow Technologies Inc., MICAz (online), available: http://www.xbow.com/Products/productdetails.aspx?sid=164, 2008 (accessed 19 February 2009).
    • Crossbow Technologies Inc., MICAz (online), available: http://www.xbow.com/Products/productdetails.aspx?sid=164, 2008 (accessed 19 February 2009).
  • 7
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: evolution, opportunities, and challenges
    • Chong C.-Y., and Kumar S.P. Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91 8 (2003) 1247-1256
    • (2003) Proc. IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.-Y.1    Kumar, S.P.2
  • 8
    • 52049121234 scopus 로고    scopus 로고
    • Sun "SPOT" Wireless Sensor Networks (online), available
    • accessed 19 February
    • R. Tow, B. Laurel, Sun "SPOT" Wireless Sensor Networks (online), available: http://www.tauzero.com/Rob_Tow/Sun-SPOTS-Sensor-Networks.html, 2008 (accessed 19 February 2009).
    • (2008)
    • Tow, R.1    Laurel, B.2
  • 9
    • 71649105243 scopus 로고    scopus 로고
    • Sun Microsystems, Inc., Project Sun SPOT: Sun Small Programmable Object Technology (online), available: http://www.sunspotworld.com/, 2009 (accessed 19 February 2009).
    • Sun Microsystems, Inc., Project Sun SPOT: Sun Small Programmable Object Technology (online), available: http://www.sunspotworld.com/, 2009 (accessed 19 February 2009).
  • 10
    • 71649092702 scopus 로고    scopus 로고
    • Sentilla Corporation, Pervasive Computing Solutions (online), available: http://www.sentilla.com/, 2009 (accessed 19 February 2009).
    • Sentilla Corporation, Pervasive Computing Solutions (online), available: http://www.sentilla.com/, 2009 (accessed 19 February 2009).
  • 12
    • 71649100805 scopus 로고    scopus 로고
    • Sun Microsystems, Inc., Java ME: Connected Limited Device Configuration (CLDC); JSR 30, JSR 139 (online), available: http://java.sun.com/products/cldc/, 2009 (accessed 19 February 2009).
    • Sun Microsystems, Inc., Java ME: "Connected Limited Device Configuration (CLDC); JSR 30, JSR 139" (online), available: http://java.sun.com/products/cldc/, 2009 (accessed 19 February 2009).
  • 13
    • 71649112034 scopus 로고    scopus 로고
    • Sun Microsystems, Inc., Java ME Technology APIs and Docs (online), available: http://java.sun.com/javame/reference/apis.jsp, 2009 (accessed 19 February 2009).
    • Sun Microsystems, Inc., Java ME Technology APIs and Docs (online), available: http://java.sun.com/javame/reference/apis.jsp, 2009 (accessed 19 February 2009).
  • 17
    • 52049119700 scopus 로고    scopus 로고
    • Securing Wireless Sensor Networks: security architectures
    • Boyle D., and Newe T. Securing Wireless Sensor Networks: security architectures. JNW 3 1 (2008) 65-77
    • (2008) JNW , vol.3 , Issue.1 , pp. 65-77
    • Boyle, D.1    Newe, T.2
  • 18
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for Wireless Sensor Networks
    • Law Y.W., Doumen J., and Hartel P. Survey and benchmark of block ciphers for Wireless Sensor Networks. ACM TOSN 2 1 (2006) 65-93
    • (2006) ACM TOSN , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3
  • 20
    • 33645091897 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    • Gupta V., Wurm M., Zhu Y., Millard M., Fung S., Gura N., Eberle H., and Shantz S. Sizzle: A standards-based end-to-end security architecture for the embedded Internet. PMC, ED-1 (2005) 425-445
    • (2005) PMC, ED-1 , pp. 425-445
    • Gupta, V.1    Wurm, M.2    Zhu, Y.3    Millard, M.4    Fung, S.5    Gura, N.6    Eberle, H.7    Shantz, S.8
  • 23
    • 71649090266 scopus 로고    scopus 로고
    • An Liu, Peng Ning, TinyECC: Elliptic Curve Cryptography for Sensor Networks Version 1.0, November 2007
    • An Liu, Peng Ning, TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 1.0), http://discovery.csc.ncsu.edu/software/TinyECC/, November 2007.
  • 24
    • 71649098719 scopus 로고    scopus 로고
    • ITU, International Telecommunication Union (online), available: http://www.itu.int/net/home/index.aspx, 2009 (accessed 19 February 2009).
    • ITU, International Telecommunication Union (online), available: http://www.itu.int/net/home/index.aspx, 2009 (accessed 19 February 2009).
  • 26
    • 71649108621 scopus 로고    scopus 로고
    • T. Dierks, E. Rescorla, RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2 (online, available:, 2008 accessed 19 February 2009
    • T. Dierks, E. Rescorla, RFC 5246 The Transport Layer Security (TLS) Protocol Version 1.2 (online), available: http://www.ietf.org/rfc/rfc5246.txt, 2008 (accessed 19 February 2009).
  • 27
    • 71649087191 scopus 로고    scopus 로고
    • CollabNet, Inc., Security Development (online), available: http://spots-security.dev.java.net/, 2008 (accessed 13 February 2009).
    • CollabNet, Inc., Security Development (online), available: http://spots-security.dev.java.net/, 2008 (accessed 13 February 2009).
  • 31
    • 71649089401 scopus 로고    scopus 로고
    • V. Gupta, B. Moeller, C. Hawk, ECC Cipher Suites for TLS (online), available: http://tools.ietf.org/id/draft-ietf-tls-ecc-10.txt, 2005 (accessed 19 February 2009).
    • V. Gupta, B. Moeller, C. Hawk, ECC Cipher Suites for TLS (online), available: http://tools.ietf.org/id/draft-ietf-tls-ecc-10.txt, 2005 (accessed 19 February 2009).
  • 32
    • 4644320619 scopus 로고    scopus 로고
    • Performance evaluation of public key based authentication in future mobile communications systems
    • Kambourakis G., Rouskas A., and Gritzalis S. Performance evaluation of public key based authentication in future mobile communications systems. EURASIP J. Wirel. Commun. Networking, ED-1 (2004) 184-197
    • (2004) EURASIP J. Wirel. Commun. Networking, ED-1 , pp. 184-197
    • Kambourakis, G.1    Rouskas, A.2    Gritzalis, S.3
  • 33
    • 71649104705 scopus 로고    scopus 로고
    • Sun Microsystems, Inc., Sun™ Small Programmable Object Technology (Sun SPOT) Developer's Guide (online), available: http://www.sunspotworld.com/docs/Blue/spot-developers-guide.pdf, 2008 (accessed 19 February 2009).
    • Sun Microsystems, Inc., Sun™ Small Programmable Object Technology (Sun SPOT) Developer's Guide (online), available: http://www.sunspotworld.com/docs/Blue/spot-developers-guide.pdf, 2008 (accessed 19 February 2009).
  • 34
    • 47749085463 scopus 로고    scopus 로고
    • Attacks on the RC4 Stream Cipher
    • Klein A. Attacks on the RC4 Stream Cipher. Des. Codes Cryptogr. 48 3 (2008) 269-286
    • (2008) Des. Codes Cryptogr. , vol.48 , Issue.3 , pp. 269-286
    • Klein, A.1
  • 35
    • 71649101711 scopus 로고    scopus 로고
    • S. Bellovin, RC4 insecurity wrt SSL/TLS? (saag) (online), 7 August, available: http://mailman.mit.edu/pipermail/saag/2001q3/000224.html, 2001 (accessed 19 February 2009).
    • S. Bellovin, RC4 insecurity wrt SSL/TLS? (saag) (online), 7 August, available: http://mailman.mit.edu/pipermail/saag/2001q3/000224.html, 2001 (accessed 19 February 2009).
  • 36
    • 71649115492 scopus 로고    scopus 로고
    • Agilent Technologies, 66321D Mobile Comm DC Source w/Battery Emulation, DVM (online), available: http://www.home.agilent.com/agilent/product.jspx?pn=66321D, 2008 (accessed 19 February 2009).
    • Agilent Technologies, 66321D Mobile Comm DC Source w/Battery Emulation, DVM (online), available: http://www.home.agilent.com/agilent/product.jspx?pn=66321D, 2008 (accessed 19 February 2009).
  • 37
    • 71649104292 scopus 로고    scopus 로고
    • Agilent Technologies, 14565B Device Characterisation Software with test Automation (online), available: http://www.home.agilent.com/agilent/product.jspx?cc=US&lc=eng&pageMode=OV&pid=852417&ct=PRODUCT&id=852417, 2008 (accessed 19 February 2009).
    • Agilent Technologies, 14565B Device Characterisation Software with test Automation (online), available: http://www.home.agilent.com/agilent/product.jspx?cc=US&lc=eng&pageMode=OV&pid=852417&ct=PRODUCT&id=852417, 2008 (accessed 19 February 2009).
  • 39
    • 71649098443 scopus 로고    scopus 로고
    • Sun Microsystems, Inc., A Sun SPOT Application Note: Using the AT91 Timer/Counter (online), available: http://www.sunspotworld.com/docs/AppNotes/TimerCounterAppNote.pdf, 2008 (accessed 19 February 2009).
    • Sun Microsystems, Inc., A Sun SPOT Application Note: Using the AT91 Timer/Counter (online), available: http://www.sunspotworld.com/docs/AppNotes/TimerCounterAppNote.pdf, 2008 (accessed 19 February 2009).
  • 40
    • 71649093724 scopus 로고    scopus 로고
    • Liverpool John Moores University, Liverpool, UK, September 11-13, 2007
    • Healy M., Newe T., and Lewis E. Efficiently Securing Data on a Wireless Sensor Network Sensors and their Applications XIV. Liverpool John Moores University, Liverpool, UK, September 11-13, 2007. Journal of Physics Conference Series 76 (2007)
    • (2007) Journal of Physics Conference Series , vol.76
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 41
    • 71649115813 scopus 로고    scopus 로고
    • Texas Instruments, CC2420 Datasheet (online), available: http://focus.ti.com/lit/ds/symlink/cc2420.pdf, 2004 (accessed 19 February 2009).
    • Texas Instruments, CC2420 Datasheet (online), available: http://focus.ti.com/lit/ds/symlink/cc2420.pdf, 2004 (accessed 19 February 2009).
  • 42
    • 71649107379 scopus 로고    scopus 로고
    • Tau Ceti Co-operative Ltd., The Legion of the BouncyCastle (online), available: http://www.bouncycastle.org/latest_releases.html, 2008 (accessed 19 February 2009).
    • Tau Ceti Co-operative Ltd., The Legion of the BouncyCastle (online), available: http://www.bouncycastle.org/latest_releases.html, 2008 (accessed 19 February 2009).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.