首页 | 本学科首页   官方微博 | 高级检索  
     


A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
Authors:Rodrigo Roman  Cristina Alcaraz  Javier Lopez
Affiliation:(1) Computer Science Department, University of Malaga, Màlaga, Spain
Abstract:
In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.
Contact Information Javier LopezEmail:
Keywords:sensor networks  hardware  cryptography
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号