In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless sensor network. In this context we have implemented the arithmetic operations required for the most computationally expensive part of IBE, which is the Tate pairing, in 90 nm CMOS and obtained area, timing and energy figures for the designs. Initial results indicate that a hardware implementation of IBE would meet the strict energy constraint of a wireless sensor network nod
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Abstract: In this recent years wireless sensors attracted the wireless sensor networks due to the si...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
In this work a scheme for key distribution and network access in a Wireless Sensor Network (WSN) tha...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
peer-reviewedDue to the sensitive nature of the data many wireless sensor networks are tasked to col...
Wireless sensor networks have a wide spectrum of civil and military applications that call for secur...
In this work the suitability of different methods of symmetric key distribution for application in w...
Recent advances in the development of compact microprocessors have brought forth new applications in...
The main topic of this paper is low-cost public key cryptography in wireless sensor nodes. Security ...
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that r...
This electronic version was submitted by the student author. The certified thesis is available in th...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Abstract: In this recent years wireless sensors attracted the wireless sensor networks due to the si...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
In this work a scheme for key distribution and network access in a Wireless Sensor Network (WSN) tha...
In spite of several years of intense research, the area of security and cryptography in Wireless Sen...
It is envisaged that the use of cheap and tiny wireless sensors will soon bring a third wave of evol...
Despite much research effort key distribution in Wireless Sensor Networks (WSNs) still remains an op...
peer-reviewedDue to the sensitive nature of the data many wireless sensor networks are tasked to col...
Wireless sensor networks have a wide spectrum of civil and military applications that call for secur...
In this work the suitability of different methods of symmetric key distribution for application in w...
Recent advances in the development of compact microprocessors have brought forth new applications in...
The main topic of this paper is low-cost public key cryptography in wireless sensor nodes. Security ...
The area of security for heterogeneous sensor networks (HSNs) is still an open research field that r...
This electronic version was submitted by the student author. The certified thesis is available in th...
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices a...
Cryptographic algorithms play an important role in the security architecture of wireless sensor netw...
Abstract: In this recent years wireless sensors attracted the wireless sensor networks due to the si...