Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Low-Energy Symmetric Key Distribution in Wireless Sensor Networks

Published: 01 May 2011 Publication History

Abstract

In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented. The scheme is analyzed on the ARM920T processor and measurements were taken for the runtime and energy of its components. It was found that the Tate pairing component of the scheme consumes significant amounts of energy, and so should be ported to hardware. An accelerator was implemented in 65 nm Complementary Metal Oxide Silicon (CMOS) technology and area, timing, and energy figures have been obtained for the design. Results indicate that a hardware implementation of IBC would meet the strict energy constraint required of a wireless sensor network node.

Cited By

View all
  • (2020)A Secure Topology Control Mechanism for SDWSNs Using Identity-Based CryptographyWireless Algorithms, Systems, and Applications10.1007/978-3-030-59016-1_39(469-481)Online publication date: 13-Sep-2020
  • (2019)A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06608-3109:2(1161-1180)Online publication date: 1-Nov-2019
  • (2016)Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty NodesIEEE Transactions on Network and Service Management10.1109/TNSM.2016.251624313:1(99-112)Online publication date: 9-Mar-2016
  • Show More Cited By
  1. Low-Energy Symmetric Key Distribution in Wireless Sensor Networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE Transactions on Dependable and Secure Computing
        IEEE Transactions on Dependable and Secure Computing  Volume 8, Issue 3
        May 2011
        160 pages

        Publisher

        IEEE Computer Society Press

        Washington, DC, United States

        Publication History

        Published: 01 May 2011

        Author Tags

        1. Wireless sensor networks
        2. hardware architecture.
        3. identity-based cryptography

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 29 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)A Secure Topology Control Mechanism for SDWSNs Using Identity-Based CryptographyWireless Algorithms, Systems, and Applications10.1007/978-3-030-59016-1_39(469-481)Online publication date: 13-Sep-2020
        • (2019)A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-019-06608-3109:2(1161-1180)Online publication date: 1-Nov-2019
        • (2016)Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty NodesIEEE Transactions on Network and Service Management10.1109/TNSM.2016.251624313:1(99-112)Online publication date: 9-Mar-2016
        • (2015)Autonomic schemes for threat mitigation in Internet of ThingsJournal of Network and Computer Applications10.1016/j.jnca.2014.11.01149:C(112-127)Online publication date: 1-Mar-2015

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media