Abstract
Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN” has changed partially due to the existence of new hardware and software prototypes based on Elliptic Curve Cryptography and other PKC primitives. Then, it is necessary to analyze whether it is both feasible and convenient to have a Public Key Infrastructure for sensor networks that would allow the creation of PKC-based services like Digital Signatures.
Keywords
- Wireless Sensor Networks
- Public Key Cryptography
- Public Key Infrastructure
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)
Public-Key Infrastructure (X.509) (pkix) Charter, http://www.ietf.org/html.charters/pkix-charter.html
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, Boca Raton, USA (2006)
Lopez, J.: Unleashing Public-Key Cryptography in Wireless Sensor Networks. Journal of Computer Security 14(5), 469–482 (2006)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Rabin, M.O.: Digitalized Signatures and Public Key Functions as Intractable as Factorization. Technical Report MIT/LCS/TR-212, Massachusetts Institute of Technology (1979)
Blake, I., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (2000)
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a Ring based Public Key Cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, Springer, Heidelberg (1998)
Wolf, C., Preneel, B.: Taxonomy of Public Key Schemes Based on the Problem of Multivariate Quadratic Equations. Cryptology ePrint Archive, Report 2005/077
National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use (August 1999)
Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on MICAz and TelosB Motes. Technical Report WM-CS-2006-07, College of William & Mary (October 2006)
Liu, A., Kampanakis, P., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks (Version 0.3) (February 2007), http://discovery.csc.ncsu.edu/software/TinyECC/
Gaubatz, G., Kaps, J.-P., Öztürk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2005), March 2005, Hawaii (USA) (2005)
Wolkerstorfer, J.: Scaling ECC Hardware to a Minimum. In: ECRYPT workshop - Cryptographic Advances in Secure Hardware - CRASH 2005, September 2005, Leuven (Belgium), Invited talk (2005)
Kumar, S., Paar, C.: Are standards compliant elliptic curve cryptosystems feasible on RFID? In: Proceedings of Workshop on RFID Security, July 2006, Graz (Austria) (2006)
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)
Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, Springer, Heidelberg (2006)
Wagner, D.: The Conventional Wisdom About Sensor Network Security... Is Wrong. IEEE Security & Privacy 2005, invited panelist, Security in Ad-hoc and Sensor Networks (May 2005)
Myketun, E., Girao, J., Westhoff, D.: Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks. In: IEEE International Conference on Communications (ICC 2006), May 2006, Istanbul (Turkey) (2006)
Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., Lopez, J., Dahab, R.: TinyTate: Identity-Based Encryption for Sensor Networks. Cryptology ePrint Archive, paper, 2007/020, http://eprint.iacr.org/2007/020.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roman, R., Alcaraz, C. (2007). Applicability of Public Key Infrastructures in Wireless Sensor Networks. In: Lopez, J., Samarati, P., Ferrer, J.L. (eds) Public Key Infrastructure. EuroPKI 2007. Lecture Notes in Computer Science, vol 4582. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73408-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-73408-6_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73407-9
Online ISBN: 978-3-540-73408-6
eBook Packages: Computer ScienceComputer Science (R0)
