TinyTate: computing the tate pairing in resource-constrained sensor nodes

被引:43
|
作者
Oliveira, Leonardo B.
Aranha, Diego F.
Morais, Eduardo
Daguano, Felipe
机构
关键词
sensor networks; security; cryptography; bilinear; pairings; Tate pairing implementation;
D O I
10.1109/NCA.2007.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
After a few years of intense research, Wireless Sensor Networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.
引用
收藏
页码:318 / 323
页数:6
相关论文
共 50 条
  • [21] Partitioning Algorithm for a Resource-Constrained Robotic Skin Sensor Network
    Vilgelm, Mikhail
    Neamtu, Gabriel
    Mittendorfer, Philipp
    Cheng, Gordon
    Kellerer, Wolfgang
    2016 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2016,
  • [22] Adaptation of the DDS Security Standard for Resource-Constrained Sensor Networks
    Beckman, Kai
    Reininger, Jonas
    2018 IEEE 13TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES), 2018, : 54 - 57
  • [23] Efficient Wind Speed Forecasting for Resource-Constrained Sensor Devices
    Herreria-Alonso, Sergio
    Suarez-Gonzalez, Andres
    Rodriguez-Perez, Miguel
    Rodriguez-Rubio, Raul F.
    Lopez-Garcia, Candido
    SENSORS, 2021, 21 (03) : 1 - 17
  • [24] Integer-Based Optimisations for Resource-Constrained Sensor Platforms
    Zoumboulakis, Michael
    Roussos, George
    SENSOR SYSTEMS AND SOFTWARE, 2010, 24 : 144 - 157
  • [25] Lightweight Management of Resource-Constrained Sensor Devices in Internet of Things
    Sheng, Zhengguo
    Wang, Hao
    Yin, Changchuan
    Hu, Xiping
    Yang, Shusen
    Leung, Victor C. M.
    IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (05): : 402 - 411
  • [26] OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
    Li, Jin
    Tan, Xiao
    Chen, Xiaofeng
    Wong, Duncan S.
    Xhafa, Fatos
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2015, 3 (02) : 195 - 205
  • [27] Resource-Constrained Serial Task Offload Strategy in Mobile Edge Computing
    Liu W.
    Huang Y.-C.
    Du W.
    Wang W.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1889 - 1908
  • [28] Computation Offloading in Resource-Constrained Multi-Access Edge Computing
    Li, Kexin
    Wang, Xingwei
    He, Qiang
    Wang, Jielei
    Li, Jie
    Zhan, Siyu
    Lu, Guoming
    Dustdar, Schahram
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (11) : 10665 - 10677
  • [29] Hermes: Latency Optimal Task Assignment for Resource-constrained Mobile Computing
    Kao, Yi-Hsuan
    Krishnamachari, Bhaskar
    Ra, Moo-Ryong
    Bai, Fan
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [30] Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
    Li, Chunlin
    Li, Layuan
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (04) : 2817 - 2837