{"title":"Self-certified public key generation on the intel mote 2 sensor network platform","authors":"O. Arazi, I. Elhanany, D. Rose, H. Qi, B. Arazi","doi":"10.1109/WIMESH.2006.288626","DOIUrl":null,"url":null,"abstract":"It is widely acknowledged that security will play a key role in the successful design and deployment of wireless sensor networks (WSN). A prerequisite for achieving security is the ability to dynamically establish a secret key joint to two nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This poster will present an efficient ECC-based method for self-certified key generation in resource-constrained sensor nodes. In particular, we provide implementation results on the Intel Mote 2 sensor network platform which demonstrate that such key generation can be established in the order of 60 msec while consuming less than 30 mJ.","PeriodicalId":426713,"journal":{"name":"2006 2nd IEEE Workshop on Wireless Mesh Networks","volume":"231 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 2nd IEEE Workshop on Wireless Mesh Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIMESH.2006.288626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
It is widely acknowledged that security will play a key role in the successful design and deployment of wireless sensor networks (WSN). A prerequisite for achieving security is the ability to dynamically establish a secret key joint to two nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public key cryptographic foundation for WSN. This poster will present an efficient ECC-based method for self-certified key generation in resource-constrained sensor nodes. In particular, we provide implementation results on the Intel Mote 2 sensor network platform which demonstrate that such key generation can be established in the order of 60 msec while consuming less than 30 mJ.