...
首页> 外文期刊>Mobile networks & applications >A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
【24h】

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

机译:硬件受限的传感器网络节点的加密基元和实现的调查

获取原文
获取原文并翻译 | 示例
           

摘要

In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.
机译:在无线传感器网络环境中,由于诸如使寿命最大化,使物理尺寸和总成本最小化的因素,传感器节点在硬件方面受到极大限制。尽管如此,这些节点必须能够基于诸如哈希函数,对称加密和公钥加密之类的原语运行加密操作,以允许创建安全服务。本文的目的是调查现有的基于研究和基于商业的传感器节点如何适合于此目的,分析硬件如何影响原语的提供以及软件实现如何解决实现这些原语实例的任务。结果,有可能在可以使用传感器的协议和应用/场景中评估安全提供的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号