Detail publikace

Energy Efficient Public Key Cryptography in Wireless Sensor Networks

ČERVENKA, V. KOMOSNÝ, D. MALINA, L. MRÁZ, Ľ.

Originální název

Energy Efficient Public Key Cryptography in Wireless Sensor Networks

Anglický název

Energy Efficient Public Key Cryptography in Wireless Sensor Networks

Jazyk

en

Originální abstrakt

This paper gives a comprehensive study of threats faced by LR-WPANs defined by IEEE 802.15.4. Although several security protocols have been developed to address this issue most of them are aimed just for a particular layer or application. Furthermore, they usually introduce great overhead in terms of energy and communication. Our effort is not just to point out security problems, but to propose energy efficient solution. We introduce and analyze energy efficient system providing symmetric key cryptography and public key cryptography so that both are possible to compute with help of AES hardware accelerator.

Anglický abstrakt

This paper gives a comprehensive study of threats faced by LR-WPANs defined by IEEE 802.15.4. Although several security protocols have been developed to address this issue most of them are aimed just for a particular layer or application. Furthermore, they usually introduce great overhead in terms of energy and communication. Our effort is not just to point out security problems, but to propose energy efficient solution. We introduce and analyze energy efficient system providing symmetric key cryptography and public key cryptography so that both are possible to compute with help of AES hardware accelerator.

Dokumenty

BibTex


@inproceedings{BUT75253,
  author="Vladimír {Červenka} and Dan {Komosný} and Lukáš {Malina} and Ľubomír {Mráz}",
  title="Energy Efficient Public Key Cryptography in Wireless Sensor Networks",
  annote="This paper gives a comprehensive study of threats faced by LR-WPANs defined by IEEE 802.15.4. Although several security protocols have been developed to address this issue most of them are aimed just for a particular layer or application. Furthermore, they usually introduce great overhead in terms of energy and communication. Our effort is not just to point out security problems, but to propose energy efficient solution. We introduce and analyze energy efficient system providing symmetric key cryptography and public key cryptography so that both are possible to compute with help of AES hardware accelerator.",
  address="Springer New York",
  booktitle="Innovations and Advances in Computer, Information, Systems Sciences, and Engineering",
  chapter="75253",
  howpublished="print",
  institution="Springer New York",
  year="2012",
  month="april",
  pages="497--509",
  publisher="Springer New York",
  type="conference paper"
}