DocumentCode :
2694332
Title :
Using Merkle´s Puzzle for key agreement with low-end devices
Author :
Armknecht, Frederik ; Westhoff, Dirk
Author_Institution :
Lehrstuhl fur Systemsicherheit Bochum, Ruhr Univ. Bochum, Bochum, Germany
fYear :
2009
fDate :
20-23 Oct. 2009
Firstpage :
858
Lastpage :
864
Abstract :
Due to severe resource restrictions, many established cryptographic schemes are not executable in sensor and actuator networks. Especially for key exchange algorithms (KE), the foundation of many cryptographic protocols, the situation is extremely challenging as most KE rely on elaborate computations and/or huge data. Hence, there is a continuous search for KE with reduced complexity. Observe that most KE burden the same workload on both communication partners. In this paper, we follow a different approach that respects the usually asymmetric capabilities of network nodes and users. We describe a key agreement protocol that allows for pushing the workload almost completely to the stronger device, e.g., the user. This allows to get any desired security level, independent of the capabilities of the weak device.
Keywords :
cryptographic protocols; Merkles puzzle; cryptographic schemes; key agreement protocol; key exchange algorithms; low-end devices; Actuators; Application software; Arithmetic; Conferences; Cryptographic protocols; Data security; Delay effects; Public key cryptography; Sensor systems and applications; Synchronization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Local Computer Networks, 2009. LCN 2009. IEEE 34th Conference on
Conference_Location :
Zurich
Print_ISBN :
978-1-4244-4488-5
Electronic_ISBN :
978-1-4244-4487-8
Type :
conf
DOI :
10.1109/LCN.2009.5355012
Filename :
5355012
Link To Document :
بازگشت