Direkt zum Inhalt

Koschuch, Manuel ; Hudler, Matthias ; Krüger, Michael ; Lory, Peter ; Wenzl, Jürgen

Optimizing cryptographic threshold schemes for the use in wireless sensor networks

Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter und Wenzl, Jürgen (2011) Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, Mohammad S. und Sevillano, Jose Luis und Ortega, Eusebi Calle, (eds.) Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011. SciTePress - Science and Technology Publications, Seville, Spain, S. 75-78. ISBN 978-989-8425-69-0.

Veröffentlichungsdatum dieses Volltextes: 25 Aug 2011 07:41
Buchkapitel


Zusammenfassung

A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, ...

A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, manipulation and eavesdropping. Conventional cryptographic countermeasures against these kind of attacks cannot be readily applied in the context of sensor networks, due to the limited resources of the individual nodes. Since single nodes can be very easily captured and examined, symmetric schemes with the secret key present in every (or at least a subset of) node(s) pose quite a risk in this setting. In this work, we examine the applicability of threshold cryptographic techniques, especially the Gennaro-Rabin-Rabin multiparty multiplication protocol, for sensor networks by employing several optimizations to the different steps of this algorithm, building on previous results we obtained. We are able to improve the running time up to a factor of 6 compared to an unoptimized version for a bitlength of 1,024 Bit and 33 players.


Beteiligte Einrichtungen


Details

DokumentenartBuchkapitel
ISBN978-989-8425-69-0
Buchtitel:Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011
Verlag:SciTePress - Science and Technology Publications
Ort der Veröffentlichung:Seville, Spain
Seitenbereich:S. 75-78
DatumJuli 2011
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik & Wirtschaftsmathematik (Prof. Dr. Peter Lory)
Stichwörter / KeywordsSensor Networks, Threshold Cryptography, Efficient Implementation, multiparty multiplication protocol of Gennaro, Rabin, and Rabin
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 000 Allgemeines, Wissenschaft
000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenZum Teil
URN der UB Regensburgurn:nbn:de:bvb:355-epub-219215
Dokumenten-ID21921

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben