EMBEDDEDEND-TO-END WIRELESSSECURITYWITHECDH KEY EXCHANGE

2004 
Sensor networks offer tremendous benefits forthe future asthey have thepotential tomakelife moreconvenient and safer Forinstance, sensors canbeused forclimate control toreduce powerconsumption, forstructures suchas bridges tomonitor themaintenance status, orfor company badges tolocate employees inorder toincrease productivity. However, theintroduction ofsuchubiquitous computingtoeveryday life also raises privacy concerns. Inthis work wepresent apublic-key cryptography implementation forsecure keyexchange onlow-end wireless devices using elliptic curves. Ourimplementation isbased onoptimal extensionfields (OEF,) thtat areaspecial type offinite fields GFJ(p"'). Asourplatform wechiose aChipcon CC/()I() chip which isbased onthe 8051architecture andthat isespecially suitedfor secure wireless applications asithasa built-in radio transceiver aswell asahardware DESengine[2]. Weareable toestablish asecure end-to-end connection between the sensor andabase station inanacceptabletimeof3seconds without requiring acryptographic col)ocessors.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    1
    References
    0
    Citations
    NaN
    KQI
    []