Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A comparison of mechanisms for improving TCP performance over wireless links
IEEE/ACM Transactions on Networking (TON)
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
I-TCP: indirect TCP for mobile hosts
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
Habitat monitoring with sensor networks
Communications of the ACM - Wireless sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Integrating elliptic curve cryptography into the web's security infrastructure
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Unleashing public-key cryptography in wireless sensor networks
Journal of Computer Security - On IWAP'05
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet
Security analysis of open building automation systems
SAFECOMP'10 Proceedings of the 29th international conference on Computer safety, reliability, and security
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
Security in wireless sensor networks: considerations and experiments
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Securing the IP-based internet of things with HIP and DTLS
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Towards viable certificate-based authentication for the internet of things
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Hi-index | 0.00 |
According to popular perception, public-key cryptography is beyond the capabilities of highly constrained, ''mote''-like, embedded devices. We show that elliptic curve cryptography not only makes public-key cryptography feasible on these devices, it allows one to create a complete secure web server stack that runs efficiently within very tight resource constraints. Our small-footprint HTTPS stack, nicknamed Sizzle, has been implemented on multiple generations of the Berkeley/Crossbow motes where it runs in less than 4 KB of RAM, completes a full SSL handshake in 1 s (session reuse takes 0.5 s) and transfers 1 KB of application data over SSL in 0.4 s. Sizzle is the world's smallest secure web server and can be embedded inside home appliances, personal medical devices, etc., allowing them to be monitored and controlled remotely via a web browser without sacrificing end-to-end security.