TinyTate: computing the tate pairing in resource-constrained sensor nodes

被引:43
|
作者
Oliveira, Leonardo B.
Aranha, Diego F.
Morais, Eduardo
Daguano, Felipe
机构
关键词
sensor networks; security; cryptography; bilinear; pairings; Tate pairing implementation;
D O I
10.1109/NCA.2007.48
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
After a few years of intense research, Wireless Sensor Networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.
引用
收藏
页码:318 / 323
页数:6
相关论文
共 50 条
  • [41] Towards the use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks
    Jacobsen, Rune Hylsberg
    Mikkelsen, Soren Aagaard
    Rasmussen, Niels Holm
    2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 233 - 240
  • [42] Source localization in resource-constrained sensor networks based on deep learning
    Javadi, S. Hamed
    Guerrero, Angela
    Mouazen, Abdul M.
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (09): : 4217 - 4228
  • [43] A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
    Wen, Mi
    Lei, Jingsheng
    Tang, Zhong
    Tian, Xiuxia
    Chen, Kefei
    Qiu, Weidong
    WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, 5854 : 413 - +
  • [44] Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks
    Zoumboulakis, Michael
    Roussos, George
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02): : 194 - 213
  • [45] Cochlea-Based Spectral Decomposition of Sensor Signals for Resource-Constrained Sensor Networks
    Peckens, C. A.
    Lynch, J. P.
    STRUCTURAL HEALTH MONITORING 2011: CONDITION-BASED MAINTENANCE AND INTELLIGENT STRUCTURES, VOL 2, 2013, : 1709 - 1716
  • [46] A distributed resource furnishing to offload resource-constrained devices in cyber foraging toward pervasive computing
    Ok, MinHwan
    Seo, Ja-Won
    Park, Myong-soon
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4658 : 416 - +
  • [47] Energy-optimized image communication on resource-constrained sensor platforms
    Lee, Dong-U
    Kim, Hyungjin
    Tu, Steven
    Rahimi, Mohammad
    Estrin, Deborah
    Villasenor, John D.
    PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2007, : 216 - 225
  • [48] Optimal sensor scheduling for resource-constrained localization of mobile robot formations
    Mourikis, Anastasios I.
    Roumeliotis, Stergios I.
    IEEE TRANSACTIONS ON ROBOTICS, 2006, 22 (05) : 917 - 931
  • [49] Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks
    Michael Zoumboulakis
    George Roussos
    Mobile Networks and Applications, 2011, 16 : 194 - 213
  • [50] Sensor and Feature Selection for Lightweight Emotion Recognition on Resource-Constrained Smartwatches
    Andreoletti, Davide
    Ayoub, Omran
    Peternier, Achille
    Leidi, Tiziano
    Giordano, Silvia
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 312 - 317