2013
DOI: 10.3390/s130809704
|View full text |Cite
|
Sign up to set email alerts
|

Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves

Abstract: Typically, commercial sensor nodes are equipped with MCUsclocked at a low-frequency (i.e., within the 4–12 MHz range). Consequently, executing cryptographic algorithms in those MCUs generally requires a huge amount of time. In this respect, the required energy consumption can be higher than using a separate accelerator based on a Field-programmable Gate Array (FPGA) that is switched on when needed. In this manuscript, we present the design of a cryptographic accelerator suitable for an FPGA-based sensor node a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 34 publications
(29 reference statements)
0
4
0
Order By: Relevance
“…Elliptic Curve Cryptography (ECC) has proven to be one of the best PKC alternatives for constrained applications [8,9,10,11,12,13] where multiple restrictions are also observed. Compared to other PKC systems, ECC features reduced key sizes for equivalent security levels [14].…”
Section: Introductionmentioning
confidence: 99%
“…Elliptic Curve Cryptography (ECC) has proven to be one of the best PKC alternatives for constrained applications [8,9,10,11,12,13] where multiple restrictions are also observed. Compared to other PKC systems, ECC features reduced key sizes for equivalent security levels [14].…”
Section: Introductionmentioning
confidence: 99%
“…Generally, encryption algorithms are either asymmetric (public‐key) or symmetric. Asymmetric ciphers provide better security service compared with symmetric ciphers but require more complex operations and thus may end up with expensive design . As such, in order to obtain an optimized security design implementation for low resource devices, it is usually preferred to use symmetric ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…Since Version 1.2 of the TLS and the DTLS protocols, the support for the ECC has been introduced. The ECC has been embedded into the IEEE 802.15.4 standard using a hardware solution as presented in [ 11 ]. Furthermore, the authentication protocols for wireless sensors networks in [ 12 , 13 ], or [ 14 ] have been based on the ECC primitives to provide a high level of security with possibly the smallest resources requirements.…”
Section: Introductionmentioning
confidence: 99%