TY - JOUR
T1 - On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
AU - Boyle, David E.
AU - Newe, Thomas
PY - 2009/12
Y1 - 2009/12
N2 - This paper considers the impact of the provision of security for a Java enabled wireless sensor networking platform. In 2007, Sun Microsystems, Inc. released a Java programmable platform; namely Sun Small Programmable Object Technology (Sun SPOT). Given the more intuitive application development environment, it is envisaged that real applications will emerge at a more rapid pace, and as such the importance of the provision of security remains to the fore. The only provision of security, to-date, is that of an industry standard TLS (Transport Layer Security) implementation at the Application Layer; rooted from an ECC (Elliptic Curve Cryptography) based public-key cryptosystem. This work demonstrates that the employment of TLS results in a reduction of 70% of network lifetime; a significant cost to provide security. Given this cost, alternative methods of securing a Sun SPOT based sensor network are considered, culminating in the specification of a cross-layer, hybrid security architecture.
AB - This paper considers the impact of the provision of security for a Java enabled wireless sensor networking platform. In 2007, Sun Microsystems, Inc. released a Java programmable platform; namely Sun Small Programmable Object Technology (Sun SPOT). Given the more intuitive application development environment, it is envisaged that real applications will emerge at a more rapid pace, and as such the importance of the provision of security remains to the fore. The only provision of security, to-date, is that of an industry standard TLS (Transport Layer Security) implementation at the Application Layer; rooted from an ECC (Elliptic Curve Cryptography) based public-key cryptosystem. This work demonstrates that the employment of TLS results in a reduction of 70% of network lifetime; a significant cost to provide security. Given this cost, alternative methods of securing a Sun SPOT based sensor network are considered, culminating in the specification of a cross-layer, hybrid security architecture.
KW - Cryptography
KW - Elliptic Curve Cryptography
KW - Java
KW - Resource consumption
KW - Security
KW - Wireless Sensor Network
UR - http://www.scopus.com/inward/record.url?scp=71649100806&partnerID=8YFLogxK
U2 - 10.1016/j.sna.2009.10.012
DO - 10.1016/j.sna.2009.10.012
M3 - Article
AN - SCOPUS:71649100806
SN - 0924-4247
VL - 156
SP - 394
EP - 405
JO - Sensors and Actuators, A: Physical
JF - Sensors and Actuators, A: Physical
IS - 2
ER -