TinyTate: computing the tate pairing in resource-constrained sensor nodes

被引:43
|
作者
Oliveira, Leonardo B.
Aranha, Diego F.
Morais, Eduardo
Daguano, Felipe
机构
关键词
sensor networks; security; cryptography; bilinear; pairings; Tate pairing implementation;
D O I
10.1109/NCA.2007.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
After a few years of intense research, Wireless Sensor Networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.
引用
收藏
页码:318 / 323
页数:6
相关论文
共 50 条
  • [1] Intelligent Resource-Constrained Sensor Nodes
    Henkel, Jorg
    IEEE DESIGN & TEST, 2019, 36 (02) : 4 - 4
  • [2] Guest Editors' Introduction: Intelligent Resource-Constrained Sensor Nodes
    Sen, Shreyas
    Raychowdhury, Arijit
    Lu, Shih-Lien L.
    IEEE DESIGN & TEST, 2019, 36 (02) : 5 - 6
  • [3] TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory
    Xiong, Xiaokang
    Wong, Duncan S.
    Deng, Xiaotie
    2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 187 - 194
  • [4] Lightweight Model Inference on Resource-Constrained Computing Nodes in Intelligent Surveillance Systems
    Wang, Zhuohang
    Zhao, Yunfeng
    Wang, Yong
    Yan, Li
    Liu, Zhicheng
    Qiu, Chao
    Wang, Xiaofei
    Hu, Qinghua
    WEB AND BIG DATA, PT I, APWEB-WAIM 2022, 2023, 13421 : 209 - 223
  • [5] A Modeling Approach for Resource Management in Resource-Constrained Nodes
    Runge, Torsten M.
    Wolfinger, Bernd E.
    Heckmueller, Stephan
    Abdollahpouri, Alireza
    JOURNAL OF NETWORKS, 2015, 10 (01) : 39 - 50
  • [6] Lightweight Security Algorithms for Resource-constrained IoT-based Sensor Nodes
    Sarker, Victor Kathan
    Tuan Nguyen Gia
    Tenhunen, Hannu
    Westerlund, Tomi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] Extensible and Realistic Modeling of Resource Contention in Resource-Constrained Nodes
    Meyer, Torsten
    Wolfinger, Bernd E.
    Heckmueller, Stephan
    Abdollahpouri, Alireza
    2013 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2013, : 1 - 9
  • [8] Computing the Tate pairing
    Scott, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 293 - 304
  • [9] Maximizing Computing Accuracy on Resource-Constrained Architectures
    Ha, Van-Phu
    Sentieys, Olivier
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [10] Efficient lightweight cryptography for resource-constrained WSN nodes
    Sable, Nilesh P.
    Rathod, Vijay U.
    Parlewar, Pallavi
    Rathod, Smita B.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 349 - 359