A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks

被引:76
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] Natl Inst Math Sci, Div Math Modeling, Daejeon 305390, South Korea
来源
关键词
Identity-based cryptography; public-key cryptography; public-key encryption; public-key infrastructure; public-key signature; side-channel attack; software implementation; SIDE CHANNEL ATTACKS; SIGNATURE SCHEME; SHORTEST VECTOR; TIME ALGORITHMS; CRYPTANALYSIS; PAIRINGS; LATTICE; COUNTERMEASURE; IMPLEMENTATION; COMMUNICATION;
D O I
10.1109/COMST.2015.2459691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality, authentication, integrity and non-repudiation. It is not toomuch to say that the selection and integration of appropriate cryptographic primitives into the security protocols determines the largest part of the efficiency and energy consumption of the wireless sensor network (WSN). There are a number of surveys on security issues on WSNs, which, however, did not focus on public-key cryptographic primitives in WSNs. In this survey, we provide a deeper understanding of public-key cryptographic primitives in WSNs including identity-based cryptography and discuss their main directions and some open research issues that can be further pursued. We investigate state-of-the-art software implementation results of public-key cryptographic primitives in terms of execution time, energy consumption and resource occupation on constrained wireless devices choosing popular IEEE 802.15.4-compliant WSN hardware platforms, used in real-life deployments. This survey provides invaluable insights on public-key cryptographic primitives on WSN platforms, and solutions to find tradeoffs between cost, performance and security for designing security protocols in WSNs.
引用
收藏
页码:577 / 601
页数:25
相关论文
共 50 条
  • [1] Watermarking Public-Key Cryptographic Primitives
    Goyal, Rishab
    Kim, Sam
    Manohar, Nathan
    Waters, Brent
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 367 - 398
  • [2] Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
    Lyubashevsky, Vadim
    Palacio, Adriana
    Segev, Gil
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 382 - +
  • [3] On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives
    Tanishita, Yuichi
    Hayashi, Ryuya
    Ishii, Ryu
    Matsuda, Takahiro
    Matsuura, Kanta
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 303 - 323
  • [4] Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
    Nishimaki, Ryo
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 179 - 209
  • [5] Revisiting public-key cryptography for wireless sensor networks
    Arazi, B
    Elhanany, I
    Arazi, O
    Qi, HR
    COMPUTER, 2005, 38 (11) : 103 - 105
  • [6] Unleashing public-key cryptography in wireless sensor networks
    Lopez, Javier
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (05) : 469 - 482
  • [7] Energy analysis of public-key cryptography for wireless sensor networks
    Wander, AS
    Gura, N
    Eberle, H
    Gupta, V
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 324 - 328
  • [8] Public-key cryptography in sensor networks
    Manley, Eric D.
    Deogun, Jitender S.
    Al Nahas, Huzaifa
    IASTED INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMERGING TECHNOLOGIES, 2005, : 120 - 125
  • [9] A Survey on Public Key Mechanism in Wireless Sensor Networks
    He Y.-X.
    Sun F.-J.
    Li Q.-A.
    He J.
    Wang L.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (03): : 381 - 408
  • [10] A Public Key Cryptographic method for Denial of Service mitigation in wireless sensor networks
    Arazi, O.
    Qi, H.
    Rose, D.
    2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 51 - 59