Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks

One of the huge problems for security in sensor networks is the lack of resources. Typical sensor nodes such as the quite popular MICA and MICA2 Motes from UC Berkeley are based on a microcontroller architecture with only a few KBytes of memory and severe limited computing ability. Strong public-key cryptography is therefore commonly seen as infeasible on such devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform. The key to our fast implementation is the use of offline precomputation and handcrafting.

[1]  Martina Zitterbart,et al.  A Flexible Concept to Program and Control Wireless Sensor Networks , 2004 .

[2]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[3]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[4]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[5]  Hans-Joachim Hof,et al.  Secure Overlay for Service Centric Wireless Sensor Networks , 2004, ESAS.

[6]  Kiyomichi Araki,et al.  Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.

[7]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[9]  Hans-Joachim Hof,et al.  Design of a Secure Distributed Service Directory for Wireless Sensornetworks , 2004, EWSN.

[10]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[11]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[12]  A. Menezes Evaluation of Security Level of Cryptography: The Elliptic Curve Discrete Logarithm Problem (ECDLP) , 2001 .

[13]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[14]  Qiang Huang,et al.  Energy/security scalable mobile cryptosystem , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[15]  Sandeep Kumar,et al.  Embedded end-to-end wireless security with ECDH key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[16]  Dirk Westhoff,et al.  Identity certified authentication for ad-hoc networks , 2003, SASN '03.

[17]  Dirk Westhoff,et al.  Zero Common-Knowledge Authentication for Pervasive Networks , 2003, Selected Areas in Cryptography.

[18]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[19]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[20]  Charalampos Manifavas,et al.  A new family of authentication protocols , 1998, OPSR.

[21]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[22]  Neal Koblitz,et al.  CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.

[23]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[24]  Jerome A. Solinas An Improved Algorithm for Arithmetic on a Family of Elliptic Curves , 1997, CRYPTO.

[25]  Hans-Joachim Hof,et al.  S-CAN: Sicheres Overlay für Sensornetze , 2004 .

[26]  Martina Zitterbart,et al.  Erste Erfahrungen mit der Karlsruher Sensornetz-Plattform , 2003 .

[27]  Hilarie K. Orman,et al.  Fast Key Exchange with Elliptic Curve Systems , 1995, CRYPTO.

[28]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[29]  Wolfgang Bauer Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.

[30]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[31]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.