Public key cryptography in sensor networks-revisited

97Citations
Citations of this article
53Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless sensor networks. It is therefore common practice to emulate the asymmetry of traditional public key based cryptographic services through a set of of protocols using symmetric key based message authentication codes (MACs). Although the low computational complexity of MACs is advantageous, the protocol layer requires time synchronization between devices on the network and a significant amount of overhead for communication and temporary storage. The requirement for a general purpose CPU to implement these protocols as well as their complexity makes them prone to vulnerabilities and practically eliminates all the advantages of using symmetric key techniques in the first place. In this paper we chanllenge the basic assumptions about public key cryptography in sensor networks which are based on a traditional software based approach. We propose a custom hardware asisted approach for which we claim that it makes public key cryptography ritms and associated parameters, careful optimization, and low-powerdesign techniques. In order to validate our claim we present proff of concept implementations of two different algorithms-Rabin's Scheme and NtruEncrypt-and analyze their architecture and performance according to various established metrics like power consumption, area, delay, throughput, level of security and energy per bit. Our implementation of NtruEncrypt in ASIC standard cell logic uses no more than 3,000 gates with an average power consumption of less than 20μW. We envision that our public key core would be embedded into a light-weight sensor node architecture.

Cite

CITATION STYLE

APA

Gaubatz, G., Kaps, J. P., & Sunar, B. (2005). Public key cryptography in sensor networks-revisited. In Lecture Notes in Computer Science (Vol. 3313, pp. 2–18). Springer Verlag. https://doi.org/10.1007/978-3-540-30496-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free