The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Sluice: Secure Dissemination of Code Updates in Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Addressing security in medical sensor networks
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
A public key technology platform for wireless sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
Proceedings of the second ACM conference on Wireless network security
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks
Proceedings of the 28th ACM symposium on Principles of distributed computing
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Reliable and secure broadcast communication over resource constrained systems
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
SM-Sens: security middleware for wireless sensor networks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Identity-based authentication protocol with paring of tate on WSN
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
Information Processing Letters
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems
CDVE'09 Proceedings of the 6th international conference on Cooperative design, visualization, and engineering
Securing RDS broadcast messages for smart grid applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
Verifiable fine-grained top-k queries in tiered sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Group device pairing based secure sensor association and key management for body area networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A randomized countermeasure against parasitic adversaries in wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
A survey on key management mechanisms for distributed Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient and distributed access control for sensor networks
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
An efficient location-based compromise-tolerant key management scheme for sensor networks
Information Processing Letters
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
On the (im)possibility of perennial message recognition protocols without public-key cryptography
Proceedings of the 2011 ACM Symposium on Applied Computing
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
Proceedings of the fourth ACM conference on Wireless network security
Scatter – secure code authentication for efficient reprogramming in wireless sensor networks
International Journal of Sensor Networks
PERSEN: power-efficient logical ring based key management for clustered sensor networks
International Journal of Sensor Networks
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Group signatures are suitable for constrained devices
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A review on body area networks security for healthcare
ISRN Communications and Networking
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Using zero knowledge to share a little knowledge: bootstrapping trust in device networks
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Personal and Ubiquitous Computing
Securing RDS broadcast messages for smart grid applications
International Journal of Autonomous and Adaptive Communications Systems
Body sensor network key distribution using human interactive channels
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
TARF: a trust-aware routing framework for wireless sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Wiselib: a generic algorithm library for heterogeneous sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
Elliptic curve cryptography on the WISP UHF RFID tag
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Evaluating 16-bit processors for elliptic curve cryptography
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
ACM Transactions on Embedded Computing Systems (TECS)
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System
Journal of Medical Systems
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Sensor network security for pervasive e-health
Security and Communication Networks
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities
Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Information Systems and e-Business Management
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
Proceedings of the first ACM workshop on Asia public-key cryptography
Secured wireless medical data transmission using modified elliptic curve cryptography
Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare
International Journal of Ad Hoc and Ubiquitous Computing
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Scalaness/nesT: type specialized staged programming for sensor networks
Proceedings of the 12th international conference on Generative programming: concepts & experiences
Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
PEES: physiology-based end-to-end security for mHealth
Proceedings of the 4th Conference on Wireless Health
Analysis of the applicability of wireless sensor networks attacks to body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Reordering computation sequences for memory-efficient binary field multiplication
The Journal of Supercomputing
A defense against clock skew replication attacks in wireless sensor networks
Journal of Network and Computer Applications
A Novel Verification Scheme for Fine-Grained Top-k Queries in Two-Tiered Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC supportin sensor network applications so that the existing PKC-based solutions can be exploited. This paper presents the design, implementation, and evaluation of TinyECC, a configurable library for ECC operations in wireless sensor networks. The primary objective of TinyECC is to provide a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. TinyECC provides a number of optimization switches, which can turn specific optimizations on or off based on developers' needs. Different combinations of the optimizations have different execution time andresource consumptions, giving developers great flexibility in integrating TinyECC into sensor network applications. This paperalso reports the experimental evaluation of TinyECC on several common sensor platforms, including MICAz, Tmote Sky, and Imote2. The evaluation results show the impacts of individual optimizations on the execution time and resource consumptions, and give the most computationally efficient and the most storage efficient configuration of TinyECC.