2016
DOI: 10.1002/sec.1670
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic‐curve cryptography for wireless sensor network nodes without hardware multiplier support

Abstract: With its relatively small key size, elliptic‐curve cryptography (ECC) is considered as the public‐key cryptographic algorithm of choice for wireless sensor networks (WSNs). In this work, we implemented ECC in the frequency domain, that is, by using the number theoretic transform, and without using hardware multiplier support, on the constrained MSP430 microcontroller widely used in WSNs. Our 169‐bit ECC implementation uses Edwards curves and performs scalar point multiplication in only 1.97 and 0.98 s for mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(19 citation statements)
references
References 42 publications
0
19
0
Order By: Relevance
“…As WSNs are resource-constrained, techniques that are more lightweight, such as symmetric ones (XOR and hash computations, for example), are more appropriate [4]. However, efficient ECC implementations in resource-constrained sensor motes have continued to be proposed [28]- [30], thus increasing the feasibility and practicality of ECC in IoT devices. Moreover, although we employ ECC to address the security weaknesses found in Adavoudi-Jolfaei et al's scheme, ECC operations are performed by users, authentication and authorization servers, and gateways with fewer resource constraints than sensor nodes.…”
Section: Our Proposed Schemementioning
confidence: 99%
“…As WSNs are resource-constrained, techniques that are more lightweight, such as symmetric ones (XOR and hash computations, for example), are more appropriate [4]. However, efficient ECC implementations in resource-constrained sensor motes have continued to be proposed [28]- [30], thus increasing the feasibility and practicality of ECC in IoT devices. Moreover, although we employ ECC to address the security weaknesses found in Adavoudi-Jolfaei et al's scheme, ECC operations are performed by users, authentication and authorization servers, and gateways with fewer resource constraints than sensor nodes.…”
Section: Our Proposed Schemementioning
confidence: 99%
“…While symmetric key cryptography is simpler and can be implemented efficiently on WSN nodes, public key cryptography (PKC) is significantly more complex and yet still needed for the distribution of the symmetric keys [9]. Elliptic-curve cryptography (ECC) [10,11] is a commonly used public-key cryptosystem and considered a viable remedy for distributing the secret keys in WSNs [12][13][14][15][16]. The efficiency of ECC depends on the speed of the performed arithmetic.…”
Section: Introductionmentioning
confidence: 99%
“…For energy-harvesting wireless sensor nodes, it is a concern whether the sensor node is able to perform a powerhungry cryptographic algorithm within the limitations of the harnessed power obtained through solar energy, mechanical vibration, electromagnetic radiation, etc. added In [16], a competent ECC implementation on the constrained MSP430 microcontroller is proposed over the optimal extension field (OEF) GF ((2 13 − 1) 13 ) [26]. The implementation uses the number theoretic transform and Edwards curve point arithmetic.…”
Section: Introductionmentioning
confidence: 99%
“…Public key cryptography (PKC) [19] provides a solution to the key distribution problem, yet it is considered computationally expensive for constrained WSN nodes. On the other hand, previous works prove PKC to be applicable on constrained WSN nodes for solving the key distribution problem [20][21][22][23][24]. Elliptic curve cryptography (ECC) [25,26] is a popular option for PKC.…”
Section: Introductionmentioning
confidence: 99%