{"title":"ECC标量乘法对无线传感器网络的影响","authors":"Merad Boudia Omar Rafik, F. Mohammed","doi":"10.1109/ISPS.2013.6581488","DOIUrl":null,"url":null,"abstract":"The security in wireless sensor networks (WSNs) becomes an attractive area of research, especially during the last few years. This is due to the large number of applications where the sensors are deployed and the security needs. Elliptic Curve Cryptography (ECC) is a public key approach that represents one of solution and even a serious candidate for providing security in WSN. Unfortunately, the execution time of its slightly complex operations makes the suitability of ECC broken to a limited number of applications. The most expensive operation in ECC is scalar point multiplication (SPM). However, the ECC based schemes depend strongly on the performance of SPM. The side channel attacks (SCA) on ECC exploit the information leaks during SPM execution in order to find the secret key. In this paper, we focus on scalar point multiplication, its efficiency and its security against SCA (in particular simple power analysis). The experimental results are realized on the 16 bits TelosB mote.","PeriodicalId":222438,"journal":{"name":"2013 11th International Symposium on Programming and Systems (ISPS)","volume":"601 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"The impact of ECC's scalar multiplication on wireless sensor networks\",\"authors\":\"Merad Boudia Omar Rafik, F. Mohammed\",\"doi\":\"10.1109/ISPS.2013.6581488\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security in wireless sensor networks (WSNs) becomes an attractive area of research, especially during the last few years. This is due to the large number of applications where the sensors are deployed and the security needs. Elliptic Curve Cryptography (ECC) is a public key approach that represents one of solution and even a serious candidate for providing security in WSN. Unfortunately, the execution time of its slightly complex operations makes the suitability of ECC broken to a limited number of applications. The most expensive operation in ECC is scalar point multiplication (SPM). However, the ECC based schemes depend strongly on the performance of SPM. The side channel attacks (SCA) on ECC exploit the information leaks during SPM execution in order to find the secret key. In this paper, we focus on scalar point multiplication, its efficiency and its security against SCA (in particular simple power analysis). The experimental results are realized on the 16 bits TelosB mote.\",\"PeriodicalId\":222438,\"journal\":{\"name\":\"2013 11th International Symposium on Programming and Systems (ISPS)\",\"volume\":\"601 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 11th International Symposium on Programming and Systems (ISPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPS.2013.6581488\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 11th International Symposium on Programming and Systems (ISPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPS.2013.6581488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The impact of ECC's scalar multiplication on wireless sensor networks
The security in wireless sensor networks (WSNs) becomes an attractive area of research, especially during the last few years. This is due to the large number of applications where the sensors are deployed and the security needs. Elliptic Curve Cryptography (ECC) is a public key approach that represents one of solution and even a serious candidate for providing security in WSN. Unfortunately, the execution time of its slightly complex operations makes the suitability of ECC broken to a limited number of applications. The most expensive operation in ECC is scalar point multiplication (SPM). However, the ECC based schemes depend strongly on the performance of SPM. The side channel attacks (SCA) on ECC exploit the information leaks during SPM execution in order to find the secret key. In this paper, we focus on scalar point multiplication, its efficiency and its security against SCA (in particular simple power analysis). The experimental results are realized on the 16 bits TelosB mote.