Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks

被引:0
|
作者
Leelavathi, G. [2 ]
Shaila, K. [1 ]
Venugopal, K. R. [3 ]
机构
[1] Vivekananda Inst Technol, Elect & Commun Engn, Bengaluru, India
[2] GSKSJTI, VTU Res Ctr, Bengaluru, India
[3] Univ Visvesvaraya Coll Engn, Bengaluru, India
关键词
Elliptic Curve Cryptography; FPGA; Goldwasser Micali algorithm; Probabilistic Encryption; Quadratic Residue; Wireless Sensor Networks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates probabilistic encryption. The encryption process is presented as a secured pseudo random number generator that supports key generation process. The main goal of our work is to design Public Key Crypto Processor with modification of Public Key Algorithms, RSA and ECC for Wireless Sensor Node architecture considering speed, time and area as the design parameters. The Crypto Processor is simulated on different FPGA devices, with key length 64 bits. The comparison of the performance is done with respect to area and speed. The proposed Public key Crypto algorithm is modeled using Verilog and synthesized on Spartan 3 and 6, Virtex 7, Kintex 7 and Artix7. Combinational path delay is not determined in any of the module implemented. The design satisfies the requirements of resource constrained Wireless Sensor Network's devices with 0.05% i.e., less device utilization with speed of 968.9MHz.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Probabilistic Encryption based MIN/MAX Computation in Wireless Sensor Networks
    Samanthula, Bharath K.
    Jiang, Wei
    Madria, Sanjay
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 1, 2013, : 77 - 86
  • [22] An FPGA Co-Processor Implementation of Homomorphic Encryption
    Cousins, David Bruce
    Golusky, John
    Rohloff, Kurt
    Sumorok, Daniel
    2014 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2014,
  • [23] Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks
    Chu, Shao-I
    Huang, Yu-Jung
    Lin, Wei-Cheng
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2718 - 2725
  • [24] Dynamic and probabilistic key management for distributed wireless sensor networks
    Saraswathi, R. Vijaya
    Sree, L. Padma
    Anuradha, K.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 502 - 507
  • [25] Localizing unknown nodes with an FPGA-enhanced edge computing UAV in wireless sensor networks: Implementation and evaluation
    Mani, Rahma
    Rios-Navarro, Antonio
    Ramos, Jose Luis Sevillano
    Liouane, Noureddine
    PERVASIVE AND MOBILE COMPUTING, 2024, 103
  • [26] A Survey on Public Key Mechanism in Wireless Sensor Networks
    He Y.-X.
    Sun F.-J.
    Li Q.-A.
    He J.
    Wang L.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (03): : 381 - 408
  • [27] Wireless sensor nodes processor architecture and design
    El Kateeb, Ali
    Ramesh, Aiyappa
    Azzawi, L.
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 982 - 985
  • [28] Wireless Sensor Nodes Processor Architecture and Design
    El Kateeb, Ali
    Ramesh, Aiyappa
    Azzawi, L.
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 892 - 897
  • [29] A Public Key Technology Platform for Wireless Sensor Networks
    Shih, Wen Chan
    Hu, Wen
    Corke, Peter
    Overs, Leslie
    SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2008, : 447 - 448
  • [30] Securing Wireless Sensor Networks with Public Key Techniques
    Kumar, Vidham
    Das, Manik Lal
    AD HOC & SENSOR WIRELESS NETWORKS, 2008, 5 (3-4) : 189 - 201