2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2015
DOI: 10.1109/icitst.2015.7412079
|View full text |Cite
|
Sign up to set email alerts
|

Optimized hardware design and implementation of EC based key management scheme for WSN

Abstract: This paper presents the design and implementation of an integrated architecture for key exchange and authentication in wireless sensor networks (WSNs) employing elliptic curve cryptography (ECC) for key management. Instead of implementing a standard algorithm such as SHA or AES for authentication, this paper considers an elliptic curve based message authentication code (MAC) for optimized design of overall structure through hardware reuse. The proposed architecture time shares the point multiplication unit bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The ECC-based hardware accelerators specific to wireless sensor nodes on ASIC and FPGA platforms are described in [24][25][26][27][28]. In [24], a new ECC-based protocol followed with a coprocessor hardware design for key distribution in wireless sensor nodes is presented over GF 2 163 .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The ECC-based hardware accelerators specific to wireless sensor nodes on ASIC and FPGA platforms are described in [24][25][26][27][28]. In [24], a new ECC-based protocol followed with a coprocessor hardware design for key distribution in wireless sensor nodes is presented over GF 2 163 .…”
Section: Introductionmentioning
confidence: 99%
“…They have connected standard motes with the FPGA for visualization purposes while performing the actual cryptographic computations on the standard motes. An ECC-based integrated hardware architecture for wireless sensor nodes is presented in [26] over GF 2 163 on Kintex-7 FPGA. Apart from the use of a Secure Hash Algorithm (SHA) or Advance Encryption Standard (AES) for authentication purposes, their design implements an Elliptic-curve based message authentication code (MAC) for efficient reuse of FPGA resources.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation