A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks

被引:76
作者
Shim, Kyung-Ah [1 ]
机构
[1] Natl Inst Math Sci, Div Math Modeling, Daejeon 305390, South Korea
关键词
Identity-based cryptography; public-key cryptography; public-key encryption; public-key infrastructure; public-key signature; side-channel attack; software implementation; SIDE CHANNEL ATTACKS; SIGNATURE SCHEME; SHORTEST VECTOR; TIME ALGORITHMS; CRYPTANALYSIS; PAIRINGS; LATTICE; COUNTERMEASURE; IMPLEMENTATION; COMMUNICATION;
D O I
10.1109/COMST.2015.2459691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality, authentication, integrity and non-repudiation. It is not toomuch to say that the selection and integration of appropriate cryptographic primitives into the security protocols determines the largest part of the efficiency and energy consumption of the wireless sensor network (WSN). There are a number of surveys on security issues on WSNs, which, however, did not focus on public-key cryptographic primitives in WSNs. In this survey, we provide a deeper understanding of public-key cryptographic primitives in WSNs including identity-based cryptography and discuss their main directions and some open research issues that can be further pursued. We investigate state-of-the-art software implementation results of public-key cryptographic primitives in terms of execution time, energy consumption and resource occupation on constrained wireless devices choosing popular IEEE 802.15.4-compliant WSN hardware platforms, used in real-life deployments. This survey provides invaluable insights on public-key cryptographic primitives on WSN platforms, and solutions to find tradeoffs between cost, performance and security for designing security protocols in WSNs.
引用
收藏
页码:577 / 601
页数:25
相关论文
共 221 条
  • [1] Abdalla M., 2001, DHIES ENCRYPTI UNPUB
  • [2] Adj G., 2014, P PAIR, P19
  • [3] Advanced Encryption Standard (AES), 2002, FED IN PROC STAND PU, V197
  • [4] Ajtai M., 2001, P 33 ANN ACM S THEOR, P601, DOI DOI 10.1145/380752.380857
  • [5] Ajtai M., 1998, P 30 ANN ACM S THEOR, P10, DOI DOI 10.1145/276698.276705
  • [6] Ajtai M., 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
  • [7] Akkar ML, 2003, LECT NOTES COMPUT SC, V2567, P267
  • [8] Alzaid H., 2008, P AISC, P95
  • [9] American Bankers Association, 1999, X9621998 ANSI AM BAN
  • [10] [Anonymous], 2012, PKCS 1 RSA CRYPT STA