Abstract

Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on a network. These protocols require significant communication and storage overhead. The limitation of such a cryptosystem is that it is not possible to guarantee the confidentiality of the session keys. It is commonly perceived that public key algorithms are slow, consume a lot of power and require a significant amount of architectural overhead. In this paper we show that it is possible to implement public key algorithms on resource constrained sensor node platforms. Using a hardware/software codesign approach, we have successfully mapped a public key cryptosystem based on Rabin's scheme onto the motes developed by Tyndall National Institute. Our implementation focuses on efficient architectures that execute the public key algorithms using minimal resources

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.