A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

TitleA Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
Publication TypeJournal Article
Year of Publication2007
AuthorsR. Roman, C. Alcaraz, and J. Lopez
JournalMobile Networks and Applications
Volume12
Number4
Pagination231-244
Date PublishedAugust
PublisherSpringer
ISSN Number1383-469X
KeywordsCryptography, Hardware, Sensor Networks
Abstract

In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.

URLhttp://www.springerlink.com/content/3785k818327456gq/
DOI10.1007/s11036-007-0024-2
Citation KeyRoman2007
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/Roman2007.pdf

Supported by