| Veröffentlichte Version Download ( PDF | 115kB) |
Optimizing cryptographic threshold schemes for the use in wireless sensor networks
Koschuch, Manuel, Hudler, Matthias, Krüger, Michael, Lory, Peter und Wenzl, Jürgen (2011) Optimizing cryptographic threshold schemes for the use in wireless sensor networks. In: Obaidat, Mohammad S. und Sevillano, Jose Luis und Ortega, Eusebi Calle, (eds.) Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011. SciTePress - Science and Technology Publications, Seville, Spain, S. 75-78. ISBN 978-989-8425-69-0.Veröffentlichungsdatum dieses Volltextes: 25 Aug 2011 07:41
Buchkapitel
Zusammenfassung
A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, ...
A huge number of small, computationally restricted sensor nodes can be connected wirelessly to form a sensor network. Such networks can be used to monitor large areas and communicate a multitude of measurements (like temperature, humidity, radiation, and so on) to a remote base station. Since this communication happens over the air interface, the transmitted messages are susceptible to forgery, manipulation and eavesdropping. Conventional cryptographic countermeasures against these kind of attacks cannot be readily applied in the context of sensor networks, due to the limited resources of the individual nodes. Since single nodes can be very easily captured and examined, symmetric schemes with the secret key present in every (or at least a subset of) node(s) pose quite a risk in this setting. In this work, we examine the applicability of threshold cryptographic techniques, especially the Gennaro-Rabin-Rabin multiparty multiplication protocol, for sensor networks by employing several optimizations to the different steps of this algorithm, building on previous results we obtained. We are able to improve the running time up to a factor of 6 compared to an unoptimized version for a bitlength of 1,024 Bit and 33 players.
Beteiligte Einrichtungen
Details
| Dokumentenart | Buchkapitel |
| ISBN | 978-989-8425-69-0 |
| Buchtitel: | Proceedings of DCNET 2011 ‑ International Conference on Data Communication Networking, July 2011 |
|---|---|
| Verlag: | SciTePress - Science and Technology Publications |
| Ort der Veröffentlichung: | Seville, Spain |
| Seitenbereich: | S. 75-78 |
| Datum | Juli 2011 |
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik & Wirtschaftsmathematik (Prof. Dr. Peter Lory) |
| Stichwörter / Keywords | Sensor Networks, Threshold Cryptography, Efficient Implementation, multiparty multiplication protocol of Gennaro, Rabin, and Rabin |
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 000 Allgemeines, Wissenschaft 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik |
| Status | Veröffentlicht |
| Begutachtet | Ja, diese Version wurde begutachtet |
| An der Universität Regensburg entstanden | Zum Teil |
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-219215 |
| Dokumenten-ID | 21921 |
Downloadstatistik
Downloadstatistik