A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes

  • Authors:
  • Rodrigo Roman;Cristina Alcaraz;Javier Lopez

  • Affiliations:
  • Computer Science Department, University of Malaga, Màlaga, Spain;Computer Science Department, University of Malaga, Màlaga, Spain;Computer Science Department, University of Malaga, Màlaga, Spain

  • Venue:
  • Mobile Networks and Applications
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.