Publication | Open Access
Elliptic curve cryptography-based access control in sensor networks
172
Citations
12
References
2006
Year
Sensor NetworksPublic Key AlgorithmEngineeringAuthentication ProtocolInformation SecuritySecure RoutingAccess ControlData PrivacyLightweight CryptographyInternet Of ThingsPublic-key CryptographyKey ManagementSecure ProtocolBlockchainElliptic Curve CryptographyData SecurityCryptography
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can fulfil the requirement, public-key cryptography is more flexible and simple rendering a clean interface for the security component. Against the popular belief that a public key scheme is not practical for sensor networks, this paper describes a public-key implementation of access control in a sensor network. We detail the implementation of Elliptic Curve Cryptography (ECC) over primary field, a public-key cryptography scheme, on TelosB, which is the latest sensor network platform. We evaluate the performance of our implementation and compare with other implementations we have ported to TelosB.
| Year | Citations | |
|---|---|---|
Page 1
Page 1