Feasibility of PKC in resource-constrained wireless sensor networks

In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs). In the early days of sensor networks, public key cryptography was thought to be completely unfeasible considering its computational complexity and energy requirements. By this time, several works have proved that the lightweight versions of many well-known public key algorithms can be utilized in WSN environment. With the expense of a little energy, public key based schemes could in fact be the best choice for ensuring data security in high-security demanding WSN applications. Here, we talk about the notion of public key cryptography in WSN, its applicability, challenges in its implementation, and present a detailed study of the significant works on PKC in WSN.

[1]  Rajeevan Amirtharajah,et al.  Self-powered signal processing using vibration-based power generation , 1998, IEEE J. Solid State Circuits.

[2]  Joseph H. Silverman,et al.  Optimizations for NTRU , 2001 .

[3]  Aziz Mohaisen,et al.  Cooperative Public Key Authentication Protocol in Wireless Sensor Network , 2006, UIC.

[4]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[5]  Chieh-Yih Wan,et al.  Intel Mote 2: an advanced platform for demanding sensor network applications , 2005, SenSys '05.

[6]  Cristina Alcaraz,et al.  Applicability of Public Key Infrastructures in Wireless Sensor Networks , 2007, EuroPKI.

[7]  A. Kansal,et al.  An environmental energy harvesting framework for sensor networks , 2003, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03..

[8]  Cormac J. Sreenan,et al.  The development of a novel minaturized modular platform for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[10]  Zhong Chen,et al.  C4W: An Energy Efficient Public Key Cryptosystem for Large-Scale Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[11]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[12]  K. Delaney,et al.  THE DEVELOPMENT OF A NOVEL MINIATURISED MODULAR PLATFORM FOR WIRELESS SENSOR NETWORKS , 2004 .

[13]  Guido Bertoni,et al.  Power aware design of an elliptic curve coprocessor for 8 bit platforms , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[14]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[15]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[16]  Chen-Mou Cheng,et al.  Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.

[17]  Rachit Agarwal,et al.  Hardware - Software Implementation of Public-Key Cryptography for Wireless Sensor Networks , 2006 .

[18]  I. Elhanany,et al.  Self-certified public key generation on the intel mote 2 sensor network platform , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[19]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.

[20]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[21]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[22]  Osman Ugus Performance of Additive Homomorphic EC-ElGamal Encryption for TinyPEDS , 2007 .

[23]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[24]  Johann Großschädl,et al.  The energy cost of cryptographic key establishment in wireless sensor networks , 2007, ASIACCS '07.

[25]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[26]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[27]  Bo-Yin Yang,et al.  Tame Transformation Signatures With Topsy-Turvy Hashes , .

[28]  Hairong Qi,et al.  Revisiting Public-Key Cryptography for Wireless Sensor Networks , 2005, Computer.

[29]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[30]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[31]  Mani B. Srivastava,et al.  Performance aware tasking for environmentally powered sensor networks , 2004, SIGMETRICS '04/Performance '04.

[32]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[33]  Vipul Gupta,et al.  Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.

[34]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.