Handbook of Applied Cryptography
Handbook of Applied Cryptography
Time-Stamping with Binary Linking Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Compact Rijndael Hardware Architecture with S-Box Optimization
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
JBitsTM Implementations of the Advanced Encryption Standard (Rijndael)
FPL '01 Proceedings of the 11th International Conference on Field-Programmable Logic and Applications
Optimally Efficient Accountable Time-Stamping
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Optimisation of the SHA-2 Family of Hash Functions on FPGAs
ISVLSI '06 Proceedings of the IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures
A Phone-Centered Body Sensor Network Platform: Cost, Energy Efficiency & User Interface
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
DSPs, BRAMs and a Pinch of Logic: New Recipes for AES on FPGAs
FCCM '08 Proceedings of the 2008 16th International Symposium on Field-Programmable Custom Computing Machines
Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA
ICIE '09 Proceedings of the 2009 WASE International Conference on Information Engineering - Volume 02
FPGA Implementation of SHA-224/256 Algorithm Oriented Digital Signature
CESCE '10 Proceedings of the 2010 International Conference on Challenges in Environmental Science and Computer Engineering - Volume 02
BBox: a distributed secure log architecture
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
SP 800-92. Guide to Computer Security Log Management
SP 800-92. Guide to Computer Security Log Management
Hi-index | 0.09 |
Health care applications based on sensors are gaining popularity. In wireless body area networks (WBANs), sensing data are gathered from a set of nodes deployed on the patient's body and sent to a central server. In such environments, security and privacy must be top priorities. Moreover, since decision-making is performed on the basis of the collected data, it can be important to maintain the chronological order of events in a secure way. In view of this, this paper proposes a system for secure logging of events in sensor networks by gathering in a secure and reliable way all information at one central point. The system guarantees the chronological order of logged events sent by the different sensors. It also allows one to detect the modification, deletion, and addition of logged data. As a proof of concept, we have designed a prototype of the gateway sensor on an FPGA platform that is responsible for the secure logging and the secure transmission of this information. Our prototype is based on the low-cost Spartan-6 FPGA which is equipped with several hard IP-cores such as Ethernet and CompactFlash, which makes it suitable for event storage. As it turns out, the FPGA board (SP-605) is able to store 20,830 logged events, computes digests in 2.51 @ms and only uses 56% of the LUTs of the FPGA. Thus, the reconfigurable nature of FPGAs makes them suitable for use in extending the capabilities of commercial gateways, in order to provide secure logging in a WSN.