Securing Resource Constraints Embedded Devices Using Elliptic Curve Cryptography

被引:0
作者
Tam, Tony [1 ]
Alfasi, Mohamed [1 ]
Mozumdar, Mohammad [1 ]
机构
[1] Calif State Univ Long Beach, Long Beach, CA 90840 USA
来源
SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII | 2014年 / 9085卷
关键词
Wireless Sensor Networks; Security; Identity Based Encryption; Elliptic Curve Cryptography;
D O I
10.1117/12.2053977
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).
引用
收藏
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2006, HDB ELLIPTIC HYPEREL, P282
[2]   MANTIS OS: An embedded multithreaded operating system for wireless micro sensor platforms [J].
Bhatti, S ;
Carlson, J ;
Dai, H ;
Deng, J ;
Rose, J ;
Sheth, A ;
Shucker, B ;
Gruenwald, C ;
Torgerson, A ;
Han, R .
MOBILE NETWORKS & APPLICATIONS, 2005, 10 (04) :563-579
[3]  
Boneh D., 2001, P CRYPTO
[4]  
Dan Boneh, 2001, P CRYPTO 2001
[5]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455
[6]  
Kent S. T., 1998, RFC 2402
[7]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[8]  
Levis P, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'04), P1
[9]   TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks [J].
Liu, An ;
Ning, Peng .
2008 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2008, :245-256
[10]  
MAXFOR Technology INC, MTMCM5000MSP MAXFOR