loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Manuel Koschuch 1 ; Matthias Hudler 1 ; Michael Krüger 1 ; Peter Lory 2 and Jürgen Wenzl 3

Affiliations: 1 FH Campus Wien and University of Applied Science, Austria ; 2 Universität Regensburg, Germany ; 3 TMMO GmbH, Germany

ISBN: 978-989-8425-69-0

Keyword(s): Sensor networks, Threshold cryptography, Efficient implementation, Multiparty multiplication protocol of Gennaro, Rabin and Rabin.

Related Ontology Subjects/Areas/Topics: Data Communication Networking ; Network Protocols ; Performance Evaluation ; Sensor Nets and Embedded Systems ; Software Engineering ; Software Project Management ; Telecommunications

Abstract: A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, manipulation and eavesdropping. Conventional cryptographic countermeasures against these kind of attacks cannot be readily applied in the context of sensor networks, due to the limited resources of the individual nodes. Since single nodes can be very easily captured and examined, symmetric schemes with the secret key present in every (or at least a subset of) node(s) pose quite a risk in this setting. In this work, we examine the applicability of threshold cryptographic techniques, especially the Gennaro-Rabin-Rabin multiparty multiplication protocol, for sensor networks by employing several op timizations to the different steps of this algorithm, building on previous results we obtained. We are able to improve the running time up to a factor of 6 compared to an unoptimized version for a bitlength of 1,024 Bit and 33 players. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.171.108

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Koschuch, M.; Hudler, M.; Krüger, M.; Lory, P. and Wenzl, J. (2011). OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper.In Proceedings of the International Conference on Data Communication Networking and Optical Communication System - Volume 1: DCNET, (ICETE 2011) ISBN 978-989-8425-69-0, pages 75-78. DOI: 10.5220/0003607400750078

@conference{dcnet11,
author={Manuel Koschuch. and Matthias Hudler. and Michael Krüger. and Peter Lory. and Jürgen Wenzl.},
title={OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper},
booktitle={Proceedings of the International Conference on Data Communication Networking and Optical Communication System - Volume 1: DCNET, (ICETE 2011)},
year={2011},
pages={75-78},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003607400750078},
isbn={978-989-8425-69-0},
}

TY - CONF

JO - Proceedings of the International Conference on Data Communication Networking and Optical Communication System - Volume 1: DCNET, (ICETE 2011)
TI - OPTIMIZING CRYPTOGRAPHIC THRESHOLD SCHEMES FOR THE USE IN WIRELESS SENSOR NETWORKS - Position Paper
SN - 978-989-8425-69-0
AU - Koschuch, M.
AU - Hudler, M.
AU - Krüger, M.
AU - Lory, P.
AU - Wenzl, J.
PY - 2011
SP - 75
EP - 78
DO - 10.5220/0003607400750078

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.