Towards Acceptable Public-Key Encryption in Sensor Networks

Erik-Oliver Blaß, Martina Zitterbart


One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2[15] platform. To our knowledge this implementation is the first to offer acceptable encryption speed while providing adequate security in sensor networks.


  1. Malan D. J., Welsh, M., Smith, M. D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, 2004
  2. Diffie, W., Hellman, M. E.: New Directions in Cryptography. IEEE Transactions on Information Theory, 1976
  3. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, S.: Embedded Endto-End Wireless Security with ECDH Key Exchange. The 46th IEEE Midwest Symposium On Circuits and Systems, 2003.
  4. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. 10th Computer and Communications Security, 2003
  5. Huang Q., Cukier J., Kobayashi, H., Liu B., Zhang, J.: Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks. International Conference on Wireless Sensor Networks and Applications, 2003
  6. Huang Q., Kobayashi, H.: Energy/security scalable mobile cryptosystem. IEEE Personal, Indoor and Mobile Radio Communications, 2003
  7. Certicom: Press Release - Certicom Announces Elliptic Curve Cryptosystem (ECC) Challenge Winner, 1997
  8. Lenstra, A. K., Verheul, E. R.: Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 2001
  9. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation, Vol. 48, 1987
  10. Weimerskirch, A., Westhoff, D.: Identity Certified Authentication for Ad-hoc Networks. 10th Workshop on Security of Ad Hoc and Sensor Networks, 2003
  11. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to strangers: Authentication in adhoc wireless networks. Symposium on Network and Distributed Systems Security, 2002
  12. Anderson, R., Bergadano F., Crispo, B., Lee, J., Manifavas C., Needham R.: A New Family of Authentication Protocols. ACMOSR: ACM Operating Systems Review, 1998
  13. El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. Proceedings of CRYPTO 84 on Advances in cryptology, 1985
  14. Federal Information Processing Standards Publication 186: Digital Signature Standard (DSS). National Institute of Standards and Technology, 1994
  15. University of California Berkeley: Tiny OS Hardware Designs, 2004

Paper Citation

in Harvard Style

Blaß E. and Zitterbart M. (2005). Towards Acceptable Public-Key Encryption in Sensor Networks . In Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005) ISBN 972-8865-24-4, pages 88-93. DOI: 10.5220/0002563200880093

in Bibtex Style

author={Erik-Oliver Blaß and Martina Zitterbart},
title={Towards Acceptable Public-Key Encryption in Sensor Networks},
booktitle={Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)},

in EndNote Style

JO - Proceedings of the 2nd International Workshop on Ubiquitous Computing - Volume 1: IWUC, (ICEIS 2005)
TI - Towards Acceptable Public-Key Encryption in Sensor Networks
SN - 972-8865-24-4
AU - Blaß E.
AU - Zitterbart M.
PY - 2005
SP - 88
EP - 93
DO - 10.5220/0002563200880093