Skip to main content

Applicability of Public Key Infrastructures in Wireless Sensor Networks

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4582)

Abstract

Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN” has changed partially due to the existence of new hardware and software prototypes based on Elliptic Curve Cryptography and other PKC primitives. Then, it is necessary to analyze whether it is both feasible and convenient to have a Public Key Infrastructure for sensor networks that would allow the creation of PKC-based services like Digital Signatures.

Keywords

  • Wireless Sensor Networks
  • Public Key Cryptography
  • Public Key Infrastructure

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)

    Google Scholar 

  2. Public-Key Infrastructure (X.509) (pkix) Charter, http://www.ietf.org/html.charters/pkix-charter.html

  3. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, Boca Raton, USA (2006)

    Google Scholar 

  4. Lopez, J.: Unleashing Public-Key Cryptography in Wireless Sensor Networks. Journal of Computer Security 14(5), 469–482 (2006)

    Google Scholar 

  5. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    CrossRef  MATH  MathSciNet  Google Scholar 

  6. Rabin, M.O.: Digitalized Signatures and Public Key Functions as Intractable as Factorization. Technical Report MIT/LCS/TR-212, Massachusetts Institute of Technology (1979)

    Google Scholar 

  7. Blake, I., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  8. Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a Ring based Public Key Cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  9. Wolf, C., Preneel, B.: Taxonomy of Public Key Schemes Based on the Problem of Multivariate Quadratic Equations. Cryptology ePrint Archive, Report 2005/077

    Google Scholar 

  10. National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use (August 1999)

    Google Scholar 

  11. Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes. Technical Report WM-CS-2006-07, College of William & Mary (October 2006)

    Google Scholar 

  12. Liu, A., Kampanakis, P., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.3) (February 2007), http://discovery.csc.ncsu.edu/software/TinyECC/

  13. Gaubatz, G., Kaps, J.-P., Öztürk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2005), March 2005, Hawaii (USA) (2005)

    Google Scholar 

  14. Wolkerstorfer, J.: Scaling ECC Hardware to a Minimum. In: ECRYPT workshop - Cryptographic Advances in Secure Hardware - CRASH 2005, September 2005, Leuven (Belgium), Invited talk (2005)

    Google Scholar 

  15. Kumar, S., Paar, C.: Are standards compliant elliptic curve cryptosystems feasible on RFID? In: Proceedings of Workshop on RFID Security, July 2006, Graz (Austria) (2006)

    Google Scholar 

  16. Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  17. Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  18. Wagner, D.: The Conventional Wisdom About Sensor Network Security... Is Wrong. IEEE Security & Privacy 2005, invited panelist, Security in Ad-hoc and Sensor Networks (May 2005)

    Google Scholar 

  19. Myketun, E., Girao, J., Westhoff, D.: Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. In: IEEE International Conference on Communications (ICC 2006), May 2006, Istanbul (Turkey) (2006)

    Google Scholar 

  20. Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., Lopez, J., Dahab, R.: TinyTate: Identity-Based Encryption for Sensor Networks. Cryptology ePrint Archive, paper, 2007/020, http://eprint.iacr.org/2007/020.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Javier Lopez Pierangela Samarati Josep L. Ferrer

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roman, R., Alcaraz, C. (2007). Applicability of Public Key Infrastructures in Wireless Sensor Networks. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73408-6_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73407-9

  • Online ISBN: 978-3-540-73408-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics