Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of symmetric keys. In fact, even if many symmetric key management schemes have been proposed, none of them is optimal in every situation (e.g., in case of mobile nodes or no deployment knowledge or large networks). Furthermore, due to computational constraints of wireless sensor nodes, public-key cryptography is seldom used in wireless sensor networks. This paper investigates existing key management schemes and proposes a new key establishment routine that exploits both the benefits of public and symmetric encryption. The proposed routine exploits a symmetric transitory secret to authenticate nodes in the network, while actual pairwise keys are established using asymmetric cryptography.
Mixed public and secret-key cryptography for wireless sensor networks / Griotti, Mattia; Gandino, Filippo; Rebaudengo, Maurizio. - ELETTRONICO. - (2018). (Intervento presentato al convegno The Tenth International Conference on Mobile Computing and Ubiquitous Networking tenutosi a Toyama, Japan nel October 3-5, 2017) [10.23919/ICMU.2017.8330094].
Mixed public and secret-key cryptography for wireless sensor networks
GRIOTTI, MATTIA;Filippo Gandino;Maurizio Rebaudengo
2018
Abstract
Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of symmetric keys. In fact, even if many symmetric key management schemes have been proposed, none of them is optimal in every situation (e.g., in case of mobile nodes or no deployment knowledge or large networks). Furthermore, due to computational constraints of wireless sensor nodes, public-key cryptography is seldom used in wireless sensor networks. This paper investigates existing key management schemes and proposes a new key establishment routine that exploits both the benefits of public and symmetric encryption. The proposed routine exploits a symmetric transitory secret to authenticate nodes in the network, while actual pairwise keys are established using asymmetric cryptography.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2707317
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo