2019
DOI: 10.3390/s19132864
|View full text |Cite
|
Sign up to set email alerts
|

Implementing RSA for Wireless Sensor Nodes

Abstract: As wireless sensor networks (WSNs) become more widespread, potential attacks against them also increase and applying cryptography becomes inevitable to make secure WSN nodes. WSN nodes typically contain only a constrained microcontroller, such as MSP430, Atmega, etc., and running public key cryptography on these constrained devices is considered a challenge. Since WSN nodes are spread around in the field, the distribution of the shared private key, which is used in a symmetric key cryptographic algorithm for s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 47 publications
0
6
0
Order By: Relevance
“…We have demonstrated how an A can systematically acquire highly ephemeral keys in MCUS. To make matters worse, for asymmetric cryptosystems, the KEP is even more extended, e.g., considering the F1611 CPU @ 8 MHz, 1024-bit RSA encryption takes hundreds of milliseconds and decryption several seconds [28]. Since we target keys during use, sanitizing keys after use is insufficient, and so is keeping keys above the function level as the key's address on the stack is exploitable and challenging to avert (see Section V-B).…”
Section: Discussion and Potential Defencesmentioning
confidence: 99%
“…We have demonstrated how an A can systematically acquire highly ephemeral keys in MCUS. To make matters worse, for asymmetric cryptosystems, the KEP is even more extended, e.g., considering the F1611 CPU @ 8 MHz, 1024-bit RSA encryption takes hundreds of milliseconds and decryption several seconds [28]. Since we target keys during use, sanitizing keys after use is insufficient, and so is keeping keys above the function level as the key's address on the stack is exploitable and challenging to avert (see Section V-B).…”
Section: Discussion and Potential Defencesmentioning
confidence: 99%
“…There are several existing implementations of RSA with a 1024-bit key on MSP430 or similar constrained microcontrollers [22], [32], [61]- [63]. However, to the best of our knowledge, there is only one other reported 2048-bit RSA implementation in the literature on a comparable constrained microcontroller, namely Gura et al's work on AT-mega128 [32].…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The RSA cryptosystem uses a key of at least 1024 bits and is widely used due to the following reasons: First, RSA systems allow fast digital signature generation, which is suitable for applications where a network requires authentication for data. Second, they are compatible with existing communication infrastructure drives to adopt RSA systems in sensor networks [ 45 ]. The performance evaluation has been carried out in the Castalia 3.3 [ 46 ] simulator using a simple scenario consisting of one receiver and five sender nodes.…”
Section: Proposed Model Evaluationmentioning
confidence: 99%