{"title":"优化了基于EC的无线传感器网络密钥管理方案的硬件设计和实现","authors":"P. Jilna, P. Deepthi, U. Jayaraj","doi":"10.1109/ICITST.2015.7412079","DOIUrl":null,"url":null,"abstract":"This paper presents the design and implementation of an integrated architecture for key exchange and authentication in wireless sensor networks (WSNs) employing elliptic curve cryptography (ECC) for key management. Instead of implementing a standard algorithm such as SHA or AES for authentication, this paper considers an elliptic curve based message authentication code (MAC) for optimized design of overall structure through hardware reuse. The proposed architecture time shares the point multiplication unit between functionalities of key exchange and MAC there by reducing the structural complexity. The proposed architecture is implemented over GF(2163) on a Kintex 7 FPGA board using Xilinx ISE. The EC point multiplication is done using Lopez-Dahab algorithm and the finite field elements are represented using Gaussian normal basis to reduce the computational complexity and resist side channel attack.","PeriodicalId":249586,"journal":{"name":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Optimized hardware design and implementation of EC based key management scheme for WSN\",\"authors\":\"P. Jilna, P. Deepthi, U. Jayaraj\",\"doi\":\"10.1109/ICITST.2015.7412079\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the design and implementation of an integrated architecture for key exchange and authentication in wireless sensor networks (WSNs) employing elliptic curve cryptography (ECC) for key management. Instead of implementing a standard algorithm such as SHA or AES for authentication, this paper considers an elliptic curve based message authentication code (MAC) for optimized design of overall structure through hardware reuse. The proposed architecture time shares the point multiplication unit between functionalities of key exchange and MAC there by reducing the structural complexity. The proposed architecture is implemented over GF(2163) on a Kintex 7 FPGA board using Xilinx ISE. The EC point multiplication is done using Lopez-Dahab algorithm and the finite field elements are represented using Gaussian normal basis to reduce the computational complexity and resist side channel attack.\",\"PeriodicalId\":249586,\"journal\":{\"name\":\"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"volume\":\"246 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2015.7412079\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2015.7412079","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Optimized hardware design and implementation of EC based key management scheme for WSN
This paper presents the design and implementation of an integrated architecture for key exchange and authentication in wireless sensor networks (WSNs) employing elliptic curve cryptography (ECC) for key management. Instead of implementing a standard algorithm such as SHA or AES for authentication, this paper considers an elliptic curve based message authentication code (MAC) for optimized design of overall structure through hardware reuse. The proposed architecture time shares the point multiplication unit between functionalities of key exchange and MAC there by reducing the structural complexity. The proposed architecture is implemented over GF(2163) on a Kintex 7 FPGA board using Xilinx ISE. The EC point multiplication is done using Lopez-Dahab algorithm and the finite field elements are represented using Gaussian normal basis to reduce the computational complexity and resist side channel attack.