Shared security: How wireless sensor networks can benefit from threshold cryptography

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless sensor networks consist of a huge number of small nodes, communicating wirelessly, to transmit any sort of measured data, like temperature, radiation, etc. At the air interface, unprotected messages can be easily intercepted and modified by an attacker. Traditionally, symmetric cryptography is deployed in sensor networks, due to the nodes being constrained in terms of energy, processing power and memory. If an attacker is now able to extract the secret symmetric key from a single node, the entire (or a huge subset of the) network is compromised. Threshold cryptography is an attractive approach to this problem: by separating the secret into several parts, an attacker has to compromise at least t + 1 nodes to be able to extract a meaningful value. In this work we investigate computational optimizations to the multiparty multiplication protocol of Gennaro, Rabin, and Rabin, thereby improving the running time of certain protocol steps by a factor of up to 6. © Springer-Verlag Berlin Heidelberg 2012.

Cite

CITATION STYLE

APA

Koschuch, M., Hudler, M., Krüger, M., Lory, P., & Wenzl, J. (2012). Shared security: How wireless sensor networks can benefit from threshold cryptography. In Communications in Computer and Information Science (Vol. 314, pp. 74–81). https://doi.org/10.1007/978-3-642-35755-8_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free