Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of symmetric keys. In fact, even if many symmetric key management schemes have been proposed, none of them is optimal in every situation (e.g., in case of mobile nodes or no deployment knowledge or large networks). Furthermore, due to computational constraints of wireless sensor nodes, public-key cryptography is seldom used in wireless sensor networks. This paper investigates existing key management schemes and proposes a new key establishment routine that exploits both the benefits of public and symmetric encryption. The proposed routine exploits a symmetric transitory secret to authenticate nodes in the network, while actual pairwise keys are established using asymmetric cryptography.

Mixed public and secret-key cryptography for wireless sensor networks / Griotti, Mattia; Gandino, Filippo; Rebaudengo, Maurizio. - ELETTRONICO. - (2018). (Intervento presentato al convegno The Tenth International Conference on Mobile Computing and Ubiquitous Networking tenutosi a Toyama, Japan nel October 3-5, 2017) [10.23919/ICMU.2017.8330094].

Mixed public and secret-key cryptography for wireless sensor networks

GRIOTTI, MATTIA;Filippo Gandino;Maurizio Rebaudengo
2018

Abstract

Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of symmetric keys. In fact, even if many symmetric key management schemes have been proposed, none of them is optimal in every situation (e.g., in case of mobile nodes or no deployment knowledge or large networks). Furthermore, due to computational constraints of wireless sensor nodes, public-key cryptography is seldom used in wireless sensor networks. This paper investigates existing key management schemes and proposes a new key establishment routine that exploits both the benefits of public and symmetric encryption. The proposed routine exploits a symmetric transitory secret to authenticate nodes in the network, while actual pairwise keys are established using asymmetric cryptography.
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2707317
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo