Implementing elliptic curve cryptography
Implementing elliptic curve cryptography
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Elliptic Curve Cryptography on a Palm OS Device
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Integrating elliptic curve cryptography into the web's security infrastructure
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Pervasive and Mobile Computing
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Energy Efficient Elliptic Curve Processor
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
A half-key key management scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
A novel key management scheme for wireless embedded systems
ACM SIGAPP Applied Computing Review
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
Security and Communication Networks
Applicability of public key infrastructures in wireless sensor networks
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
ETA: efficient and tiny and authentication for heterogeneous wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Hi-index | 0.00 |
Sensor networks technology has shown to be of great value for a whole range of wireless applications. Nonetheless, according to experts, the great revolution is still to come, when wireless sensor networks (WSN) will form part of hundreds of standard of living real-world applications. Thus, future of this technology seems to be more than promising. Representative security problems from typical wireless networks have needed much extra effort from researchers when facing the constrained nature of the sensor platforms and, in fact, other new and specific security issues still need to be worked out. Precisely, because the limited features of WSN, solutions based on symmetric cryptography have been primarily used by the scientific community so far, while solutions based on public-key cryptography have been traditionally considered too expensive. In this paper, we firstly overview WSN technology and applications. Then, we focus on the security issues by analyzing the use of symmetric cryptography in contrast with public-key cryptography, and the important role that elliptic curve cryptography is playing in this field. Finally, we put into perspective some important results obtained by different authors during the last couple of years and that all together demonstrate, in our opinion, that there is an important space for public-key technology-based solutions in WSN applications.