A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases
Information and Computation
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
An End-to-End Systems Approach to Elliptic Curve Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable Dual-Field Elliptic Curve Cryptographic Processor
IEEE Transactions on Computers
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Message authentication for wireless sensor networks
CIS'09 Proceedings of the international conference on Computational and information science 2009
Efficient message authentication protocol for WSN
WSEAS Transactions on Computers
A survey of communication/networking in Smart Grids
Future Generation Computer Systems
Hi-index | 0.00 |
Public Key Cryptography (PKC), although very beneficial for keydistribution, authentication and other related issues, was for along time considered as too expensive for small, battery-poweredand resource-constrained devices. In the recent years, firstresearch groups started to cope with the challenges applying PKC insuch environments. One of the results is that Elliptic CurveCryptography (ECC) fits here perfectly, providing the level ofsecurity RSA does, but with much shorter keys. In this paper, weevaluate the power consumption induced by various PKC approachesincluding calculation and transmission costs. Our results clearlyshow that hardware accelerators significantly reduce the energyconsumption and prolong lifetime of sensor nodes. Our solution for163 bit ECC needs only 1.02 mm² cell area in a 0.25 µmtechnology and only 12.8 µWs per point multiplication. Due toits small size it can be manufactured for about 0.05 USD in massproduction.