Elliptic curve cryptography on smart cards without coprocessors
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Efficient elliptic curve exponentiation
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
From Euclid's GCD to Montgomery Multiplication to the Great Divide
From Euclid's GCD to Montgomery Multiplication to the Great Divide
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
IEICE - Transactions on Information and Systems
Knapsack based ECC for digital signature authentication
International Journal of Communication Networks and Distributed Systems
IBE-lite: a lightweight identity-based cryptography for body sensor networks
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Microsearch: A search engine for embedded devices used in pervasive computing
ACM Transactions on Embedded Computing Systems (TECS)
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems
CDVE'09 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering
Sensor networks with secure public-key over GF (2m)
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Minimizing hamming weight based on 1's complement of binary numbers over GF(2m)
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
TikiriAC: node-level equally distributed access control for shared sensor networks
REALWSN'10 Proceedings of the 4th international conference on Real-world wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Error compensation algorithm in wireless sensor networks synchronisation
International Journal of Sensor Networks
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Public key cryptography-based security scheme for wireless sensor networks in healthcare
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
A secure data aggregation scheme for wireless sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Cooperative security in distributed networks
Computer Communications
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
A new trusted roaming protocol in wireless mesh networks
International Journal of Sensor Networks
Hi-index | 0.00 |
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfil the requirement, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network. We detail the implementation of Elliptic Curve Cryptography (ECC) over primary field, a public-key cryptography scheme, on TelosB, which is the latest sensor network platform. We evaluate the performance of our implementation and compare with other implementations we have ported to TelosB.