Cryptanalysis of the Oil & Vinegar Signature Scheme
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Analyzing and modeling encryption overhead for sensor network nodes
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Algebraic Attack on HFE Revisited
ISC '08 Proceedings of the 11th international conference on Information Security
Fast Multivariate Signature Generation in Hardware: The Case of Rainbow
FCCM '08 Proceedings of the 2008 16th International Symposium on Field-Programmable Custom Computing Machines
Message Authentication in Computationally Constrained Environments
IEEE Transactions on Mobile Computing
Mobility, sensing, and security management in wireless ad hoc sensor systems
Computers and Electrical Engineering
Lightweight broadcast authentication protocols reconsidered
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of HFE with internal perturbation
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
l-invertible cycles for multivariate quadratic (MQ) public key cryptography
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
An efficient anonymous authentication mechanism for delay tolerant networks
Computers and Electrical Engineering
Balancing security and energy consumption in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks
IEEE Transactions on Computers
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Key management systems for sensor networks in the context of the Internet of Things
Computers and Electrical Engineering
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
An efficient provable distinguisher for HFE
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Rainbow, a new multivariable polynomial signature scheme
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A study of the security of unbalanced oil and vinegar signature schemes
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
IEEE Communications Magazine
Hi-index | 0.00 |
In a wireless sensor networks (WSN), large numbers of tiny sensor devices observe their environment and communicate the observation to a sink. Security is vital to avoid false reporting, safety of sensors and sensed objects. In particular, message authentication is crucial to prevent false response that may be evoked by a message. This necessitates a strong cryptographic mechanism to ensure safety. However, existing resource intensive cryptographic mechanisms are can affect the performance and lifetime of a WSN adversely. To address this problem of security in resource limited WSN, multivariate cryptosystem schemes are proposed and evaluated in this paper. The viability of different multivariate cryptosystems have been analyzed on the anvil of computation and memory requirements. Simulation results show that multivariate cryptosystem require small computation time and low memory that make them viable for security provisioning in a WSN. Results also show that the throughput of the network is large with low average delay even with large number of sensor nodes.