Cryptography Reference
In-Depth Information
Chapter 9
Implementation of Elliptic
Curve Cryptography in
Wireless Sensor Networks
In This Chapter
• Design principles for the implementation of ECC on WSN
• Selection of ECC security parameters
• Various sensor platforms
• Optimized algorithms for finite field arithmetic for WSN
9.1 Introduction
The invention of Public Key Cryptography (PKC) has revolutionized the construction
of cryptographic systems and provided a secure foundation for the implementation of
cryptographic theory in real-world applications. Efficient computation of PKC in sensor
nodes has been extensively investigated by researchers. However, implementing crypto-
graphic operations in devices with power, space, and time constraints limits the sensor's
ability to handle the additional computations required by cryptographic operations.
PKC is indeed shown to be feasible in WSNs by using Elliptic Curve Cryptography
(ECC). However, the resource-constraint nature of WSN has imposed serious chal-
lenges to the efficient computation of cryptographic schemes on such networks. In
173
 
Search WWH ::




Custom Search