Skip to main content

Energy Efficient Public Key Cryptography in Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 152))

Abstract

As Wireless Sensor Networks are getting to be more applied in commercial solutions (e.g. Smart Grid and Energy Saving Outdoor Lighting) the more important issue, is to provide proper security. This paper gives a comprehensive study of threats faced by Low Rate Wireless Personal Area Networks defined by IEEE 802.15.4. Although several security protocols have been developed to address this issue most of them are aimed just for a particular layer or application. Furthermore, they usually introduce great overhead in terms of energy and communication. Our effort is not just to point out security problems, but to propose energy efficient solution. We introduce and analyze energy efficient system providing symmetric key cryptography and public key cryptography so that both are possible to compute with help of advanced encryption standard hardware accelerator. We show that this hardware based solution is more than 100 times more energy efficient than purely software solution.

This paper was prepared within the framework of No. FR-TI2/571 grant project of the Ministry of Industry and Trade of the Czech Republic.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cervenka V, Komosny D, Kathiravelu G (2011) IETF 6LoWPAN and sensor networking. In: Proceedings of the 6th international conference on teleinformatics, pp 69–73

    Google Scholar 

  2. Sen J (2009) A survey on wireless sensor network security. Int J Commun Netw Inf Secur 1(2):3–10

    Google Scholar 

  3. Wander AS, Gura N, Eberle H, Gupta V, Shantz SC (2005) Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the 3rd IEEE international conference on pervasive computing and communication

    Google Scholar 

  4. Ludovici A et al (2009) Implementation and evaluation of the enhanced header compression (IPHC) for 6LoWPAN. In: EUNICE, pp 168–177

    Google Scholar 

  5. Gutiérrez JA, Callaway ED, Barrett RL (2003) Low-rate wireless personal area networks: enabling wireless sensor with IEEE 802.15.4. Standards Information Network IEEE Press, New York

    Google Scholar 

  6. Liu D, Ning P (2007) Security for wireless sensor networks. Springer, New York

    Google Scholar 

  7. Perring A et al (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521–534

    Article  Google Scholar 

  8. Goodspeed T et al (2011) Packets in packets: Orson Welles in-band signaling attacks for modern radios. In: Proceedings of the 20th USENIX security symposium

    Google Scholar 

  9. Wright J (2009) KillerBee: practical zigbee exploitation framework. Presented at the 11th ToorCon conference, San Diego

    Google Scholar 

  10. Shon T et al (2011) A secure and robust connectivity architecture for smart devices and applications. EURASIP J Wirel Commun Netw 2011:200

    Google Scholar 

  11. Finnigin KM (2007) Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. Int J Secur Netw 2(3–4):260–271

    Article  Google Scholar 

  12. Goodspeed T (2011) PRNG vulnerability of Z-stack zigbee SEP ECC. http://www.travisgoodspeed.blogspot.com/2009/12/prng-vulnerability-of-z-stack-zigbee.html, 10 Sept 2011

  13. Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th international conference on information processing in sensor networks, pp 245–256

    Google Scholar 

  14. Szczechowiak P et al (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Proceedings of the 7th international conference on information processing in sensor networks, pp 305–320

    Google Scholar 

  15. Wang H, Li Q (2006) Efficient implementation of public key cryptosystems on mote sensors. In: Proceedings of the international conference on information and communication security, pp 519–528

    Google Scholar 

  16. Kargl A et al (2008) Fast arithmetic on ATmega128 for elliptic curve cryptography. International Association for Cryptologic Research Eprint archive, Oct 2008

    Google Scholar 

  17. Texas Instruments (2011) MSP430F16x, MSP430F161x mixed signal microcontroller datasheet, Oct 2002. Revised Mar 2011

    Google Scholar 

  18. Healy M, Newe1 T, Lewis E (2007) Efficiently securing data on a wireless sensor network. J Phys Conf Ser 76(1):012063

    Google Scholar 

  19. Energy Micro (2011) EFM32G890 datasheet. Revised May 2011

    Google Scholar 

  20. McGrew D et al (2011) “AES-CCM ECC cipher suites for TLS” draft-mcgrew-tls-aes-ccm-ecc-02

    Google Scholar 

  21. Aydos M et al (2000) An high-speed ECC-based wireless authentication protocol on an ARM microprocessor. In: Proceedings of the 16th annual computer security applications conference

    Google Scholar 

  22. Ekelund Ø (2009) Low energy AES hardware for microcontroller. MA thesis, Norwegian University of Science and Technology, Norway

    Google Scholar 

  23. Jongdeog Lee M et al (2010) The price of security in wireless sensor networks. Comput Netw 54(17):2967–2978

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Cervenka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Cervenka, V., Komosny, D., Malina, L., Mraz, L. (2013). Energy Efficient Public Key Cryptography in Wireless Sensor Networks. In: Elleithy, K., Sobh, T. (eds) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 152. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3535-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3535-8_42

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3534-1

  • Online ISBN: 978-1-4614-3535-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics