메뉴 건너뛰기




Volumn 14, Issue 3, 2017, Pages 237-248

On emerging family of elliptic curves to secure internet of things: ECC comes of age

Author keywords

Internet of things; Key exchange scheme; MICAz node; Resource constraint microcontrollers; Signature scheme; Tmote sky node

Indexed keywords

AUTHENTICATION; ENERGY UTILIZATION; GEOMETRY; INTERNET OF THINGS; PUBLIC KEY CRYPTOGRAPHY; SIDE CHANNEL ATTACK;

EID: 85021181773     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2577022     Document Type: Article
Times cited : (124)

References (48)
  • 1
    • 85021070463 scopus 로고    scopus 로고
    • (Rev. 2467O-AVR-10/06) Oct
    • Atmel Corporation, ATmega128(L) Datasheet (Rev. 2467O-AVR-10/06), Oct. 2006. [Online]. Available: http://www.atmel.com/dyn/resources/prod-documents/doc2467.pdf
    • (2006) Atmel Corporation ATmega128(L) Datasheet
  • 3
    • 33745965912 scopus 로고    scopus 로고
    • Curve25519: New diffie-hellman speed records
    • Berlin, Germany: Springer Verlag
    • D. J. Bernstein, "Curve25519: New Diffie-Hellman speed records, " in Public Key Cryptography. Berlin, Germany: Springer Verlag, 2006, pp. 207-228.
    • (2006) Public Key Cryptography , pp. 207-228
    • Bernstein, D.J.1
  • 4
    • 45449095464 scopus 로고    scopus 로고
    • Twisted edwards curves
    • Cryptology. Berlin, Germany: Springer Verlag
    • D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters, "Twisted Edwards curves, " In Progress in. Cryptology. Berlin, Germany: Springer Verlag, 2008, pp. 389-405.
    • (2008) Progress , pp. 389-405
    • Bernstein, D.J.1    Birkner, P.2    Joye, M.3    Lange, T.4    Peters, C.5
  • 8
    • 84950324340 scopus 로고    scopus 로고
    • Selecting elliptic curves for cryptography: An efficiency and security analysis
    • J. W. Bos, C. Costello, P. Longa, and M. Naehrig, "Selecting elliptic curves for cryptography: An efficiency and security analysis, " J. Cryptographic Eng., pp. 1-28, 2015.
    • (2015) J. Cryptographic Eng , pp. 1-28
    • Bos, J.W.1    Costello, C.2    Longa, P.3    Naehrig, M.4
  • 9
    • 84919952513 scopus 로고    scopus 로고
    • Constant time modular inversion
    • J. W. Bos, "Constant time modular inversion, " J. Cryptographic Eng., vol. 4, no. 4, pp. 275-281, 2014.
    • (2014) J. Cryptographic Eng , vol.4 , Issue.4 , pp. 275-281
    • Bos, J.W.1
  • 10
    • 84939136474 scopus 로고    scopus 로고
    • Modeling energy-efficient secure communications in multimode wireless mobile devices
    • A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione and A. Santis, "Modeling energy-efficient secure communications in multimode wireless mobile devices, " J. Comput. Syst. Sci., vol. 81, no. 8, pp. 1464-1478, 2014.
    • (2014) J. Comput. Syst. Sci , vol.81 , Issue.8 , pp. 1464-1478
    • Castiglione, A.1    Palmieri, F.2    Fiore, U.3    Castiglione, A.4    Santis, A.5
  • 13
    • 84961252640 scopus 로고    scopus 로고
    • FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne Prime
    • Cryptology, Berlin, Germany Springer
    • C. Costello and P. Longa, "FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne Prime, " In Advances. in Cryptology, Berlin, Germany: Springer, 2015, pp. 214-235.
    • (2015) Advances , pp. 214-235
    • Costello, C.1    Longa, P.2
  • 15
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • L. M. Feeney and M. Nilsson, "Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, " in Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc., 2001, vol. 3, pp. 1548-1557.
    • (2001) Proc. 20th Annu. Joint Conf IEEE Comput. Commun. Soc , vol.3 , pp. 1548-1557
    • Feeney, L.M.1    Nilsson, M.2
  • 16
    • 77649245119 scopus 로고    scopus 로고
    • Software implementation of pairingbased cryptography on sensor networks using the MSP430 microcontroller
    • Berlin, Germany: Springer Verlag
    • C. P. Gouvea and J. Lopez, "Software implementation of pairingbased cryptography on sensor networks using the MSP430 microcontroller, " in Progress in Cryptology. Berlin, Germany: Springer Verlag, 2009, pp. 248-262.
    • (2009) Progress in Cryptology , pp. 248-262
    • Gouvea, C.P.1    Lopez, J.2
  • 18
  • 20
    • 84978948501 scopus 로고    scopus 로고
    • Ed448-Goldilocks, a new elliptic curve
    • 2015/ 625
    • M. Hamburg, "Ed448-Goldilocks, a new elliptic curve, " Cryptology ePrint Archive Rep. 2015/625, 2015.
    • (2015) Cryptology EPrint Archive Rep
    • Hamburg, M.1
  • 22
    • 84873380326 scopus 로고    scopus 로고
    • Privacy preserving payments on computational RFID devices with application in intelligent transportation systems
    • Berlin, Germany: Springer Verlag
    • G. Hinterwälder, C. Paar, and W. P. Burleson, "Privacy preserving payments on computational RFID devices with application in intelligent transportation systems, " In Radio Frequency Identification Security and Privacy Issues. Berlin, Germany: Springer Verlag, 2012, pp. 109-122.
    • (2012) Radio Frequency Identification Security and Privacy Issues , pp. 109-122
    • Hinterwälder, G.1    Paar, C.2    Burleson, W.P.3
  • 23
    • 84926635301 scopus 로고    scopus 로고
    • Full-size high-security ECC implementation on MSP430 microcontrollers
    • Lecture Notes in Computer Science. Berlin, Germany: Springer Verlag 2015
    • G. Hinterwälder, A. Moradi, M. Hutter, P. Schwabe, and C. Paar, "Full-size high-security ECC implementation on MSP430 microcontrollers, " In Progress in Cryptology-LATINCRYPT 2014, vol. 8895 of Lecture Notes in Computer Science. Berlin, Germany: Springer Verlag, 2015, pp. 31-47.
    • (2014) Progress in Cryptology-LATINCRYPT , vol.8895 , pp. 31-47
    • Hinterwälder, G.1    Moradi, A.2    Hutter, M.3    Schwabe, P.4    Paar, C.5
  • 24
    • 58349103020 scopus 로고    scopus 로고
    • Twisted Edwards curves revisited
    • Berlin, Germany: Springer Verlag
    • H. Hisil, K. K.-H. Wong, G. Carter, and E. Dawson, "Twisted Edwards curves revisited, " in Adv. Cryptology. Berlin, Germany: Springer Verlag, 2008, pp. 326-343.
    • (2008) Adv. Cryptology , pp. 326-343
    • Hisil, H.1    Wong, K.K.-H.2    Carter, G.3    Dawson, E.4
  • 25
    • 0000827611 scopus 로고
    • A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis
    • T. Itoh and S. Tsujii, "A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis, " Inf. Comput., vol. 78, pp. 171-177, 1988.
    • (1988) Inf. Comput , vol.78 , pp. 171-177
    • Itoh, T.1    Tsujii, S.2
  • 28
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks", in Proc. 7th Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 245-256.
    • (2008) Proc. 7th Int. Conf. Inf. Process. Sensor Netw , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 30
    • 84903637006 scopus 로고    scopus 로고
    • MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks
    • Berlin, Germany: Springer Verlag
    • Z. Liu, E. Wenger, and J. Großschädl, "MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks, " in Applied Cryptography and Network Security. Berlin, Germany: Springer Verlag, 2014, pp. 361-379.
    • (2014) Applied Cryptography and Network Security , pp. 361-379
    • Liu, Z.1    Wenger, E.2    Großschädl, J.3
  • 31
    • 84942512044 scopus 로고    scopus 로고
    • Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks
    • Z. Liu, H. Seo, Z. Hu, X. Huang, and J. Großschädl, "Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks, " in Proc. AsiaCCS ACM, 2015, 2015, pp. 145-153.
    • (2015) Proc. AsiaCCS ACM , vol.2015 , pp. 145-153
    • Liu, Z.1    Seo, H.2    Hu, Z.3    Huang, X.4    Großschädl, J.5
  • 33
    • 80052320777 scopus 로고    scopus 로고
    • Shifting primes: Extension of pseudo-Mersenne primes to optimize ECC for MSP430-based future Internet of things devices
    • Berlin, Germany: Springer Verlag
    • L. Marin, A. J. Jara, and A. F. Gomez-Skarmeta, "Shifting primes: Extension of pseudo-Mersenne primes to optimize ECC for MSP430-based future Internet of things devices, " In Availability, Reliab. Secur. Business, Enterprise and Health Infor. Syst., Berlin, Germany: Springer Verlag, 2011, pp. 205-219.
    • (2011) Availability, Reliab. Secur. Business, Enterprise and Health Infor. Syst , pp. 205-219
    • Marin, L.1    Jara, A.J.2    Gomez-Skarmeta, A.F.3
  • 34
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Jan
    • P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization, " Math. Comput., vol. 48, no. 177, pp. 243-264, Jan. 1987.
    • (1987) Math. Comput , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 35
    • 84856097278 scopus 로고    scopus 로고
    • Elliptic curve cryptography on the WISP UHF RFID tag
    • Berlin, Germany: Springer Verlag
    • C. Pendl, M. Pelnar, and M. Hutter, "Elliptic curve cryptography on the WISP UHF RFID tag, " in RFID Security and Privacy. Berlin, Germany: Springer Verlag, pp. 32-47, 2012.
    • (2012) RFID Security and Privacy , pp. 32-47
    • Pendl, C.1    Pelnar, M.2    Hutter, M.3
  • 36
  • 37
    • 84921417375 scopus 로고    scopus 로고
    • Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
    • Jan
    • M. Rezvani, A. Ignatovic, E Bertino, and S. Jha, "Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 98-110, Jan. 2015.
    • (2015) IEEE Trans. Dependable Secure Comput , vol.12 , Issue.1 , pp. 98-110
    • Rezvani, M.1    Ignatovic, A.2    Bertino, E.3    Jha, S.4
  • 38
    • 84896504545 scopus 로고    scopus 로고
    • Binary and prime field multiplication for public key cryptography on embedded microprocessors
    • Apr
    • H. Seo, Y. Lee, H. Kim, T. Park, and H. Kim, "Binary and prime field multiplication for public key cryptography on embedded microprocessors, " Security Commun. Netw., vol. 7, no. 4, pp. 774-787, Apr. 2014.
    • (2014) Security Commun. Netw , vol.7 , Issue.4 , pp. 774-787
    • Seo, H.1    Lee, Y.2    Kim, H.3    Park, T.4    Kim, H.5
  • 39
    • 84873810158 scopus 로고    scopus 로고
    • Performance enhancement of TinyECC based on multiplication optimizations
    • Feb
    • H. Seo, K.-A. Shim, and H. Kim, "Performance enhancement of TinyECC based on multiplication optimizations, " Secur. Commun. Netw., vol. 6, no. 2, pp. 151-160, Feb. 2013.
    • (2013) Secur. Commun. Netw , vol.6 , Issue.2 , pp. 151-160
    • Seo, H.1    Shim, K.-A.2    Kim, H.3
  • 40
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • Berlin, Germany: Springer Verlag
    • P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks, " in Wireless Sensor Networks. Berlin, Germany: Springer Verlag, 2008, pp. 305-320.
    • (2008) Wireless Sensor Networks , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 42
    • 70350617038 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
    • T. Wolf and S. Parameswaran, editors
    • O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. A. Huss, "Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks, " in T. Wolf and S. Parameswaran, editors, Proc. 2nd Workshop Embedded Syst. Secur., pp. 11-16, 2007. [Online]. Available: http://arxiv. org/abs/0903.3900.
    • (2007) Proc. 2nd Workshop Embedded Syst. Secur , pp. 11-16
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 43
    • 85008955601 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors
    • P. Ning, S. Qing, and N. Li, editors. Berlin, Germany: Springer Verlag
    • H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors, " in P. Ning, S. Qing, and N. Li, editors, Information and Communications Security. Berlin, Germany: Springer Verlag, 2006, pp. 519-528.
    • (2006) Information and Communications Security , pp. 519-528
    • Wang, H.1    Li, Q.2
  • 44
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • Dec
    • H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks, " Int. J. Secur. Netw., vol. 1, no. 3-4, pp. 127-137, Dec. 2006.
    • (2006) Int. J. Secur. Netw , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 45
    • 84879870623 scopus 로고    scopus 로고
    • Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography
    • Berlin, Germany: Springer Verlag
    • E. Wenger, "Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography, " in Applied Cryptography and Network Security. Berlin, Germany: Springer Verlag, 2013, pp. 290-306.
    • (2013) Applied Cryptography and Network Security , pp. 290-306
    • Wenger, E.1
  • 47
    • 84055198650 scopus 로고    scopus 로고
    • Evaluating 16-bit processors for elliptic curve cryptography
    • Berlin, Germany: Springer Verlag
    • E. Wenger and M. Werner, "Evaluating 16-bit processors for elliptic curve cryptography, " in Smart Card Research and Advanced Applications. Berlin, Germany: Springer Verlag, 2011, pp. 166-181.
    • (2011) Smart Card Research and Advanced Applications , pp. 166-181
    • Wenger, E.1    Werner, M.2
  • 48
    • 0036505481 scopus 로고    scopus 로고
    • Incomplete reduction in modular arithmetic
    • Mar
    • T. Yank, E. Savas , and C . K. Koc, "Incomplete reduction in modular arithmetic, " in IEE Proc.-Comput. Digital Tech., vol. 149, no. 2, pp. 46-52, Mar. 2002.
    • (2002) IEE Proc.-Comput. Digital Tech , vol.149 , Issue.2 , pp. 46-52
    • Yank, T.1    Savas, E.2    Koc, C.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.