【24h】

Implementation of ECDSA in WSN

机译:在WSN中实施ECDSA

获取原文
获取原文并翻译 | 示例

摘要

Wireless sensor networks (WSN's) have been finding their application in diversified fields. Certain WSN applications used in military and commercial fields require the data communication within the network to be secure and confidentiality of the data needs to be maintained. Any WSN security model requires key services, authentication and integrity. As WSN nodes are resource constrained, in terms of limited battery energy and less CPU capabilities, energy efficient crypto-algorithms need to be chosen. Elliptic curve (EC) based algorithms have proven to be computationally efficient and provide the same security level when compared with traditional crypto-algorithms for the given key size. This work provides implementation details of ECDSA, making use of the low-cost SHA-1. The WSN implementation of SHA-1 involves 8-bit operations as the IRIS node supports an 8- bit micro-controller. The SHA-1 and ECDSA algorithms have been implemented using IRIS WSN node.
机译:无线传感器网络(WSN)已在各种领域中找到了其应用。在军事和商业领域中使用的某些WSN应用程序要求网络内的数据通信是安全的,并且需要维护数据的机密性。任何WSN安全模型都需要关键服务,身份验证和完整性。由于WSN节点受到资源限制,因此就电池电量有限和CPU能力不足而言,需要选择节能的加密算法。与给定密钥大小的传统加密算法相比,基于椭圆曲线(EC)的算法已被证明具有较高的计算效率并提供相同的安全级别。这项工作利用低成本的SHA-1提供了ECDSA的实施细节。 SHA-1的WSN实现涉及8位操作,因为IRIS节点支持8位微控制器。 SHA-1和ECDSA算法已使用IRIS WSN节点实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号