dc.creator | Oliveira, LB | |
dc.creator | Kansal, A | |
dc.creator | Gouvea, CPL | |
dc.creator | Aranha, DF | |
dc.creator | Lopez, J | |
dc.creator | Priyantha, B | |
dc.creator | Goraczko, M | |
dc.creator | Zhao, F | |
dc.date | 2012 | |
dc.date | APR | |
dc.date | 2014-07-30T18:31:36Z | |
dc.date | 2015-11-26T16:29:55Z | |
dc.date | 2014-07-30T18:31:36Z | |
dc.date | 2015-11-26T16:29:55Z | |
dc.date.accessioned | 2018-03-28T23:10:58Z | |
dc.date.available | 2018-03-28T23:10:58Z | |
dc.identifier | Computer Journal. Oxford Univ Press, v. 55, n. 4, n. 384, n. 396, 2012. | |
dc.identifier | 0010-4620 | |
dc.identifier | WOS:000302300000002 | |
dc.identifier | 10.1093/comjnl/bxr089 | |
dc.identifier | http://www.repositorio.unicamp.br/jspui/handle/REPOSIP/71294 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/71294 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1269845 | |
dc.description | Recent works have shown the usefulness of network and application layer protocols that connect low-power sensor nodes directly to multiple applications and users on the Internet. We propose a security solution for this scenario. While previous works have provided security support for various communication patterns in sensor networks, such as among nodes, from nodes to a base station, and from users to nodes, the security of communication from sensor nodes to multiple users has not been sufficiently addressed. Specifically, we explore this design space and develop a security solution, named Secure Tiny Web Service, for efficient authentication of data sent by a resource-constrained sensor node to multiple users, using digital signatures. We investigate the resource overheads in communication and computation of four suitable signature schemes-the Elliptic Curve Digital Signature Algorithm, the (elliptic curve) Schnorr signature, and the Boneh-Lynn-Shacham and Zhang-Safavi-Naini-Susilo short signature schemes. We implement these schemes on two popular sensor node architectures (based on AVR ATmega128L and MSP430 processors with 802.15.4 radios) and experimentally characterize relevant trade-offs. | |
dc.description | 55 | |
dc.description | 4 | |
dc.description | 384 | |
dc.description | 396 | |
dc.language | en | |
dc.publisher | Oxford Univ Press | |
dc.publisher | Oxford | |
dc.publisher | Inglaterra | |
dc.relation | Computer Journal | |
dc.relation | Comput. J. | |
dc.rights | fechado | |
dc.rights | http://www.oxfordjournals.org/access_purchase/self-archiving_policyb.html | |
dc.source | Web of Science | |
dc.subject | wireless sensor networks | |
dc.subject | security | |
dc.subject | cryptography | |
dc.subject | authentication | |
dc.subject | digital signatures | |
dc.subject | Pairing-based Cryptography | |
dc.subject | Short Signatures | |
dc.subject | Implementation | |
dc.subject | Curves | |
dc.title | Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks | |
dc.type | Artículos de revistas | |