
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Kealan McCusker, Noel E. O'Connor, "LowEnergy Symmetric Key Distribution in Wireless Sensor Networks," IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 3, pp. 363376, May/June, 2011.  
BibTex  x  
@article{ 10.1109/TDSC.2010.73, author = {Kealan McCusker and Noel E. O'Connor}, title = {LowEnergy Symmetric Key Distribution in Wireless Sensor Networks}, journal ={IEEE Transactions on Dependable and Secure Computing}, volume = {8}, number = {3}, issn = {15455971}, year = {2011}, pages = {363376}, doi = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2010.73}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Dependable and Secure Computing TI  LowEnergy Symmetric Key Distribution in Wireless Sensor Networks IS  3 SN  15455971 SP363 EP376 EPD  363376 A1  Kealan McCusker, A1  Noel E. O'Connor, PY  2011 KW  Wireless sensor networks KW  identitybased cryptography KW  hardware architecture. VL  8 JA  IEEE Transactions on Dependable and Secure Computing ER   
[1] J.M. Rabaey, M. Ammer, J.L. da SilvaJr., D. Patel, and S. Roundy, "PicoRadio Supports Ad Hoc UltraLow Power Wireless Networking," Computer, vol. 33, no. 7, pp. 4248, July 2000.
[2] J.L. Hill, "System Architecture for Wireless Sensor Networks," PhD dissertation, Univ. California, Berkeley, http://www.cs. berkeley.edujhill, 2003.
[3] A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensors Networks," Comm. ACM, vol. 47, no. 6, pp. 5357, June 2004.
[4] H. Chan and A. Perrig, "Security and Privacy in Sensors Networks," Computer, vol. 36, no. 10, pp. 103105, Oct. 2003.
[5] C. Savarese, J.M. Rabaey, and J. Beutel, "Locationing in Distributed AdHoc Wireless Sensor Networks," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP), May 2001.
[6] A. Shamir, "IdentityBased Cryptosystems and Signature Schemes," Proc. Crypto '84, pp. 4754, Aug. 1984.
[7] B. Doyle, S. Bell, A.F. Smeaton, K. McCusker, and N. O'Connor, "Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks," The Computer J., vol. 49, no. 4, pp. 443453, 2006.
[8] H.B. Cheng, G. Yang, J.T. Wang, and X. Huang, "An Authenticated IdentityBased Key Establishment and Encryption Scheme for Wireless Sensor Networks," The J. China Univ. of Posts and Telecomm., vol. 13, no. 1, pp. 3138, 2006.
[9] L. Oliveira, M. Scott, J. Lopez, and R. Dahab, "TinyPBC: Pairings for Authenticated IdentityBased NonInteractive Key Distribution in Sensor Networks," Proc. Fifth Int'l Conf. Networked Sensing Systems (INSS '08), pp. 173180, June 2008.
[10] P. Szczechowiak, A. Kargl, M. Scott, and M. Collier, "On the Application of Pairing Based Cryptography to Wireless Sensor Networks," Proc. Second ACM Conf. Wireless Network Security (WiSec '09), pp. 112, 2009.
[11] Y.H. Kim, H. Lee, J.H. Park, L.T. Yang, and D.H. Lee, "Key Establishment Scheme for Sensor Networks with Low Communication Cost," Proc. Fourth Int'l Autonomic and Trusted Computing, pp. 441448, 2007.
[12] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "LocationBased CompromiseTolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247260, Feb. 2006.
[13] D. Boneh and M. Franklin, "IdentityBased Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586614, 2003.
[14] MICA2 Wireless Measurement System, Crossbow Technology, http:/www.xbow.com, 2011.
[15] R. Adler, M. Flanigan, J. Huang, R. Kling, N. Kushalnagar, L. Nachman, C.Y Wan, and M. Yarvis, "Intel Mote 2: An Advanced Platform for Demanding Sensor Network Applications," Proc. Third Int'l Conf. Embedded Networked Sensor Systems (SenSys '05), pp. 298298, 2005.
[16] D. Hankerson, A.J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, SpringerVerlag New York, 2003.
[17] L.C. Washington, Elliptic Curves, Number Theory and Cryptography. Chapman & Hall/CRC, 2003.
[18] I. Blake, G. Seroussi, N. Smart, and J.W.S. Cassels, Advances in Elliptic Curve Cryptography. Cambridge Univ. Press, 2005.
[19] I.M. Duursma and H.S Lee, "Tate Pairing Implementation for Hyperelliptic Curves ${\rm y}^{2}= {\rm x}^{{\rm p}}{\rm x} + {\rm d}$ ," Proc. Ninth Int'l Conf. Theory and Applications of Cryptology and Information Security (ASIACRYPT), pp. 111123, 2003.
[20] S. Kwon, "Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields." Proc. 10th Australasian Conf. Information Security and Privacy (ACISP), pp. 134145, 2005.
[21] P.S.L.M. Barreto, S. Galbraith, C.O. hEigeartaigh, and M. Scott, "Efficient Pairing Computation on Supersingular Abelian Varieties," Report 2004/375, Cryptology ePrint Archive, http:/eprint.iacr.org/, 2004.
[22] L. Eschenauer and V.D. Gligor, "A KeyManagement Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 4147, 2002.
[23] H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. Symp. Security and Privacy, pp. 197213, May 2003.
[24] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "PerfectlySecure Key Distribution for Dynamic Conferences," Proc. Advances in Cryptology, pp. 471486, 1993.
[25] R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Proc. EUROCRYPT '84 Workshop Advances in Cryptology: Theory and Applications of Cryptographic Techniques, pp. 335338, 1985.
[26] D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 4177, 2005.
[27] W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228258, 2005.
[28] R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems Based on Pairing," Proc. Symp. Cryptography and Information Security (SCIS '00), pp. 2628, Jan. 2000.
[29] P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.J Quisquater, "Efficient and ProvablySecure IdentityBased Signatures and Signcryption from Bilinear Maps," Proc. 11th Int'l Conf. Theory and Application of Cryptology and Information Security, Advances in Cryptology (ASIACRYPT), pp. 515532, 2005.
[30] Y.C. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 370380, Feb. 2006.
[31] J.R. Douceur, "The Sybil Attack," Proc. Int'l Workshop PeertoPeer Systems (IPTPS), pp. 251260, 2002.
[32] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), pp. 259268, 2004.
[33] "Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL)," M. Scott, http://ftp.computing.dcu.ie/pub/cryptomiracl.zip , 2008.
[34] "ARM922T," ARM, http:/www.arm.com, 2011.
[35] S. Roundy, D. Steingart, L. Frechette, P.K. Wright, and J.M. Rabaey, "Power Sources for Wireless Sensor Networks," Proc. First European Workshop Wireless Sensor Networks (EWSN), pp. 117, 2004.
[36] E.D. Mastrovito, "VLSI Architectures for Computation in Galois Fields," PhD dissertation, Linköping Univ., 1989.
[37] A. Karatsuba and Y. Ofman, "Multiplication of ManyDigital Numbers by Automatic Computers," Translation in PhysicsDoklady, vol. 7, pp. 595596, 1963.
[38] K. Fong, D. Hankerson, J. Lopez, and A. Menezes, "Field Inversion and Point Halving Revisited," IEEE Trans. Computers, vol. 53, no. 8, pp. 10471059, Aug. 2004.
[39] R.J. McEliece, Finite Fields for Computer Scientists and Engineers. Kluwer Academic Publishers, 1987.
[40] T. Itoh and S. Tsujii, "A Fast Algorithm for Computing Multiplicative Inverses in $GF(2^m)$ Using Normal Bases," Information and Computation, vol. 78, no. 3, pp. 171177, 1988.
[41] J. Guajardo and C. Paar, "ItohTsujii Inversion in Standard Basis and Its Application in Cryptography and Codes," Designs, Codes and Cryptography, vol. 25, no. 2, pp. 207216, 2002.
[42] TSMC 65nm Technology Platform, Taiwan Semiconductor Manufacturing Company, http:/www.tsmc.com, 2011.
[43] "Synopsys," Synopsys, http:/www.synopsys.com, 2011.
[44] C. Shu, K. Gaj, and S. Kwon, "FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields," Proc. IEEE Int'l Conf. Field Programmable Technology (FPT '06), pp. 173180, Dec. 2006.
[45] T. Kerins, C. Murphy, C.O. hEigeartaigh, R. Ronan, and M. Scott, "FPGA Acceleration of the Tate Pairing in Characteristic 2," Proc. IEEE Int'l Conf. Field Programmable Technology, pp. 213220, Dec. 2006.
[46] M. Keller, T. Kerins, F. Crowe, and W. Marnane, "FPGA Implementation of a ${GF}(2^m)$ Tate Pairing Architecture," Proc. Int'l Workshop Applied Reconfigurable Computing (ARC), pp. 358369, 2006.
[47] M. Keller, R. Ronan, W. Marnane, and C. Murphy, "A ${GF}(2^{4m})$ Inverter and Its Application in a Reconfigurable Tate Pairing Processor," Proc. IEEE Int'l Conf. Reconfigurable Computing and FPGA's, pp. 110, Sept. 2006.