|Title||A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes|
|Publication Type||Journal Article|
|Year of Publication||2007|
|Authors||R. Roman, C. Alcaraz, and J. Lopez|
|Journal||Mobile Networks and Applications|
|Keywords||Cryptography, Hardware, Sensor Networks|
In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes