A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Secure dissemination of code updates in sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
Aggregated path authentication for efficient BGP security
Proceedings of the 12th ACM conference on Computer and communications security
Secure code distribution in dynamically programmable wireless sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Pervasive learning games: explorations of hybrid educational gamescapes
Simulation and Gaming - Symposium: Video games: Issues in research and learning, part 2
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
An elliptical cryptographic algorithm for RF wireless devices
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
TinySA: a security architecture for wireless sensor networks
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
MobiRate: making mobile raters stick to their word
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
EAP-Sens: a security architecture for wireless sensor networks
Proceedings of the 4th Annual International Conference on Wireless Internet
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
IEEE Transactions on Information Forensics and Security
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
The energy cost of SSL in deeply embedded systems
The energy cost of SSL in deeply embedded systems
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
Balancing security and energy consumption in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A Semantic Enhanced Service Proxy Framework for Internet of Things
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Security Challenges in the IP-based Internet of Things
Wireless Personal Communications: An International Journal
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Randomized grid based scheme for wireless sensor network
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A novel pairwise key predistribution scheme for ubiquitous sensor network
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Tiny 3-TLS: a trust delegation protocol for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
Journal of Network and Systems Management
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Sensor network security for pervasive e-health
Security and Communication Networks
A secure data aggregation scheme for wireless sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
This paper introduces Sizzle, the first fully-implemented end-to-end security architecture for highly constrained embedded devices. According to popular perception, publickey cryptography is beyond the capabilities of such devices. We show that elliptic curve cryptography (ECC) not only makes public-key cryptography feasible on these devices, it allows one to create a complete secure web server stack including SSL, HTTP and user application that runsefficiently within very tight resource constraints. Our small footprint HTTPS stack needs less than 4KB of RAM and interoperates with an ECC-enabled version of the Mozilla web browser. We have implemented Sizzle on the 8-bit Berkeley/Crossbow Mica2 "mote" platform where it can complete a full SSL handshake in less than 4 seconds (session reuse takes under 2 seconds) and transfer 450 bytes of application data over SSL in about 1 second. We present additional optimizations that can further improve performance. To the best of our knowledge, this is the worldýs smallest secure web server (in terms of both physical dimensions and resources consumed) and significantly lowers the barrier for connecting a variety of interesting new devices (e.g. home appliances, personal medical devices) to the Internet without sacrificing end-to-end security.