Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A comparison of mechanisms for improving TCP performance over wireless links
IEEE/ACM Transactions on Networking (TON)
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
An End-to-End Systems Approach to Elliptic Curve Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
I-TCP: indirect TCP for mobile hosts
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
Habitat monitoring with sensor networks
Communications of the ACM - Wireless sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Integrating elliptic curve cryptography into the web's security infrastructure
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
TikiriAC: node-level equally distributed access control for shared sensor networks
REALWSN'10 Proceedings of the 4th international conference on Real-world wireless sensor networks
Key management in secure self organized wireless sensor network: a new approach
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Hi-index | 0.00 |
According to popular perception, public-key cryptography is beyond the capabilities of highly constrained, "mote"-like, embedded devices. We show that elliptic curve cryptography not only makes public-key cryptography feasible on these devices, it allows one to create a complete secure web server stack that runs efficiently within very tight resource constraints. Our small- footprint HTTPS stack, nick-named Sizzle, has been implemented on multiple generations of the Berkeley/Crossbow motes where it runs in less than 4KB of RAM, completes a full SSL handshake in 1 second (session reuse takes 0.5 seconds) and transfers 1 KB of application data over SSL in 0.4 seconds. Sizzle is the world's smallest secure web server and can be embedded inside home appliances, personal medical devices, etc., allowing them to be monitored and controlled remotely via a web browser without sacrificing end-to-end security. This report is an extended version of a paper that received the "Mark Weiser Best Paper Award" at the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), Hawaii, March 2005.