Abstract
As Wireless Sensor Networks are getting to be more applied in commercial solutions (e.g. Smart Grid and Energy Saving Outdoor Lighting) the more important issue, is to provide proper security. This paper gives a comprehensive study of threats faced by Low Rate Wireless Personal Area Networks defined by IEEE 802.15.4. Although several security protocols have been developed to address this issue most of them are aimed just for a particular layer or application. Furthermore, they usually introduce great overhead in terms of energy and communication. Our effort is not just to point out security problems, but to propose energy efficient solution. We introduce and analyze energy efficient system providing symmetric key cryptography and public key cryptography so that both are possible to compute with help of advanced encryption standard hardware accelerator. We show that this hardware based solution is more than 100 times more energy efficient than purely software solution.
This paper was prepared within the framework of No. FR-TI2/571 grant project of the Ministry of Industry and Trade of the Czech Republic.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cervenka V, Komosny D, Kathiravelu G (2011) IETF 6LoWPAN and sensor networking. In: Proceedings of the 6th international conference on teleinformatics, pp 69–73
Sen J (2009) A survey on wireless sensor network security. Int J Commun Netw Inf Secur 1(2):3–10
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the 3rd IEEE international conference on pervasive computing and communication
Ludovici A et al (2009) Implementation and evaluation of the enhanced header compression (IPHC) for 6LoWPAN. In: EUNICE, pp 168–177
Gutiérrez JA, Callaway ED, Barrett RL (2003) Low-rate wireless personal area networks: enabling wireless sensor with IEEE 802.15.4. Standards Information Network IEEE Press, New York
Liu D, Ning P (2007) Security for wireless sensor networks. Springer, New York
Perring A et al (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521–534
Goodspeed T et al (2011) Packets in packets: Orson Welles in-band signaling attacks for modern radios. In: Proceedings of the 20th USENIX security symposium
Wright J (2009) KillerBee: practical zigbee exploitation framework. Presented at the 11th ToorCon conference, San Diego
Shon T et al (2011) A secure and robust connectivity architecture for smart devices and applications. EURASIP J Wirel Commun Netw 2011:200
Finnigin KM (2007) Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. Int J Secur Netw 2(3–4):260–271
Goodspeed T (2011) PRNG vulnerability of Z-stack zigbee SEP ECC. http://www.travisgoodspeed.blogspot.com/2009/12/prng-vulnerability-of-z-stack-zigbee.html, 10 Sept 2011
Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th international conference on information processing in sensor networks, pp 245–256
Szczechowiak P et al (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Proceedings of the 7th international conference on information processing in sensor networks, pp 305–320
Wang H, Li Q (2006) Efficient implementation of public key cryptosystems on mote sensors. In: Proceedings of the international conference on information and communication security, pp 519–528
Kargl A et al (2008) Fast arithmetic on ATmega128 for elliptic curve cryptography. International Association for Cryptologic Research Eprint archive, Oct 2008
Texas Instruments (2011) MSP430F16x, MSP430F161x mixed signal microcontroller datasheet, Oct 2002. Revised Mar 2011
Healy M, Newe1 T, Lewis E (2007) Efficiently securing data on a wireless sensor network. J Phys Conf Ser 76(1):012063
Energy Micro (2011) EFM32G890 datasheet. Revised May 2011
McGrew D et al (2011) “AES-CCM ECC cipher suites for TLS” draft-mcgrew-tls-aes-ccm-ecc-02
Aydos M et al (2000) An high-speed ECC-based wireless authentication protocol on an ARM microprocessor. In: Proceedings of the 16th annual computer security applications conference
Ekelund Ø (2009) Low energy AES hardware for microcontroller. MA thesis, Norwegian University of Science and Technology, Norway
Jongdeog Lee M et al (2010) The price of security in wireless sensor networks. Comput Netw 54(17):2967–2978
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Cervenka, V., Komosny, D., Malina, L., Mraz, L. (2013). Energy Efficient Public Key Cryptography in Wireless Sensor Networks. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_42
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3535-8_42
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3534-1
Online ISBN: 978-1-4614-3535-8
eBook Packages: EngineeringEngineering (R0)