Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
How public key cryptography influences wireless sensor node lifetime
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
A survey of key management schemes in wireless sensor networks
Computer Communications
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A random perturbation-based scheme for pairwise key establishment in sensor networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Proceedings of the 5th conference on Computing frontiers
Public key based authentication for secure integration of sensor data and RFID
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
An authentication scheme for filtering injected bogus data in sensor networks
Computer Communications
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
A Random Key Management Scheme for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
A novel key management algorithm in sensor networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
Distributed data source verification in wireless sensor networks
Information Fusion
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Pushing the limits of one-time signatures
Proceedings of the 2nd international conference on Security of information and networks
ShortPK: A short-term public key scheme for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
A multivariate key-establishment scheme for wireless sensor networks
IEEE Transactions on Wireless Communications
Cost of secure sensing in IEEE 802.15.4 networks
IEEE Transactions on Wireless Communications
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
The energy cost of SSL in deeply embedded systems
The energy cost of SSL in deeply embedded systems
Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI)
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A security architecture for wireless sensor networks based-on public key cryptography
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
Information Processing Letters
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Balancing security and energy consumption in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Structures for communication-efficient public key revocation in ubiquitous sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Efficient KEMs with partial message recovery
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
N-dimensional grid-based key predistribution in wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Toward development of high secure sensor network nodes using an FPGA-based architecture
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Hybrid trust and reputation management for sensor networks
Wireless Networks
A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive security level for data aggregation in wireless sensor networks
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Dynamic window based multihop authentication for WSN
Proceedings of the 17th ACM conference on Computer and communications security
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Constructing better KEMs with partial message recovery
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks
ELECTRO'10 Proceedings of the 8th WSEAS international conference on Applied electromagnetics, wireless and optical communications
EDDK: energy-efficient distributed deterministic key management for wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Intrusion-resilient integrity in data-centric unattended WSNs
Pervasive and Mobile Computing
A review on body area networks security for healthcare
ISRN Communications and Networking
A key management method based on an AVL tree and ECC cryptography for wireless sensor networks
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient ID-Based bilinear key predistribution scheme for distributed sensor networks
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Information Sciences: an International Journal
Message and its origin authentication protocol for data aggregation in sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Fine grained load balancing in multi-hop wireless networks
Journal of Parallel and Distributed Computing
Framework for key management scheme in heterogeneous wireless sensor networks
iUBICOM'10 Proceedings of the 5th international conference on Ubiquitous and Collaborative Computing
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Data security in unattended wireless sensor networks with mobile sinks
Wireless Communications & Mobile Computing
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Self-healing in unattended wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A Privacy-Strengthened Scheme for E-Healthcare Monitoring System
Journal of Medical Systems
(k, n) threshold distributed key exchange for HIP based internet of things
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Large scale wireless sensor networks with multi-level dynamic key management scheme
Journal of Systems Architecture: the EUROMICRO Journal
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Hi-index | 0.00 |
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-gal28L low-power microcontroller indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.