WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes

نویسندگان

  • Haodong Wang
  • Bo Sheng
  • Chiu C. Tan
  • Qun Li
چکیده

While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytography) public-key cryptosystem implementation on the existing commercial sensor devices. We detail the implementation of 160-bit ECC cryptosystems over prime field on MICAz, TelosB and Tmote Sky sensor motes. We evaluate the performance of our implementation by running digital signature generation and verification. We have achieved the performance of 0.77s for signature generation and 1.12s for signature verification on Tmote Sky sensor motes. Comparatively, we show the performance on MICAz and TelosB motes are 1.35s and 1.45s for signature generation, 1.96 and 2.25 for signature verification, respectively. This technical report summarize our previous implementation effort presented in [11, 12, 13, 10].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TelosB Implementation of Elliptic Curve Cryptography over Primary Field WM-CS Technical Report (WM-CS-2005-12)

Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfill many security requirements, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that public key scheme is not practical for sensor networks, this paper describes a public-key implementation in a sensor netwo...

متن کامل

TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote

In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2) is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF (2) on sensor motes, their performances are not satisfactory enough t...

متن کامل

TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF (2) on 8-bit MICAz Mote

In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2) is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF (2) on sensor motes, their performances are not satisfactory enough t...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves

Typically, commercial sensor nodes are equipped with MCUsclocked at a low-frequency (i.e., within the 4-12 MHz range). Consequently, executing cryptographic algorithms in those MCUs generally requires a huge amount of time. In this respect, the required energy consumption can be higher than using a separate accelerator based on a Field-programmable Gate Array (FPGA) that is switched on when nee...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007