## TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks

### Cached

### Download Links

- [discovery.csc.ncsu.edu]
- [discovery.csc.ncsu.edu]
- [discovery.csc.ncsu.edu]
- [discovery.csc.ncsu.edu]
- DBLP

### Other Repositories/Bibliography

Citations: | 64 - 1 self |

### BibTeX

@MISC{Liu_tinyecc:a,

author = {An Liu and Peng Ning},

title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks },

year = {}

}

### OpenURL

### Abstract

Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC support in sensor network applications so that the existing PKC-based solutions can be exploited. This paper presents the design, implementation, and evaluation of TinyECC, a configurable library for ECC operations in wireless sensor networks. The primary objective of TinyECC is to provide a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. TinyECC provides a number of optimization switches, which can turn specific optimizations on or off based on developers ’ needs. Different combinations of the optimizations have different execution time and resource consumptions, giving developers great flexibility in integrating TinyECC into sensor network applications. This paper also reports the experimental evaluation of TinyECC on several common sensor platforms, including MICAz, Tmote Sky, and Imote2. The evaluation results show the impacts of individual optimizations on the execution time and resource consumptions, and give the most computationally efficient and the most storage efficient configuration of TinyECC.

### Citations

2728 | New directions in cryptography
- Diffie, Hellman
- 1976
(Show Context)
Citation Context ...n wireless sensor networks. In contrast, PKC can address all these problems easily. Pairwise key establishment can always be achieved using, for example, the Diffie-Hellman (DH) key exchange protocol =-=[15]-=-, without suffering from the node compromise problem. Similarly, broadcast authentication can be provided with, for example, the ECDSA digital signature scheme [9], without requiring time synchronizat... |

2477 | Handbook of Applied Cryptography
- Menezes, Oorschot, et al.
- 1996
(Show Context)
Citation Context ...per is not these individual optimization techniques. More information about these techniques can be found in the relevant references. 4.1. Optimizations for Large Integer Operations Barrett Reduction =-=[33]-=-: The most straightforward way to perform large integer modular reductions is to use division [23]. A nice side effect of such a method is that it reuses the code of division, thus resulting in compac... |

1171 | Wireless sensor networks: a survey - Akyildiz, Su, et al. |

744 | SPINS: Security protocols for sensor networks
- Perrig, Szewczyk, et al.
- 2001
(Show Context)
Citation Context ...plications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., [12, 16, 17, 27, 29]) and broadcast authentication (e.g., =-=[28, 30, 38]-=-). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-distribution schemes can guarantee key establishment... |

703 | The nesC language: a holistic approach to networked embedded systems
- Gay, vonBehren, et al.
- 2003
(Show Context)
Citation Context ...e, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. Targeted at TinyOS [6], TinyECC is written in nesC =-=[18]-=-, with occasional in-line assembly code to achieve further speedup for popular sensor platforms including MICAz [2], TelosB [5], Tmote Sky [7], and Imote2 [1]. A unique feature of TinyECC is its confi... |

683 |
The Art of Computer Programming, Volume 2: Seminumerical Algorithms, third ed
- Knuth
- 1998
(Show Context)
Citation Context ...e found in the relevant references. 4.1. Optimizations for Large Integer Operations Barrett Reduction [33]: The most straightforward way to perform large integer modular reductions is to use division =-=[23]-=-. A nice side effect of such a method is that it reuses the code of division, thus resulting in compact code size. Barrett Reduction is an alternative method for modular reduction [33]. It converts th... |

596 | A key-management scheme for distributed sensor networks
- Eschenauer, Gligor
- 2002
(Show Context)
Citation Context ...niques that can bypass PKC operations in sensor network applications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., =-=[12, 16, 17, 27, 29]-=-) and broadcast authentication (e.g., [28, 30, 38]). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-di... |

554 | Random Key Predistribution Schemes for Sensor Networks
- Chan, Perrig, et al.
- 2003
(Show Context)
Citation Context ...niques that can bypass PKC operations in sensor network applications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., =-=[12, 16, 17, 27, 29]-=-) and broadcast authentication (e.g., [28, 30, 38]). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-di... |

382 | Guide to Elliptic Curve Cryptography
- Menezes, Hankerson, et al.
- 2004
(Show Context)
Citation Context ...30 key establish (ECDH) Figure 13. Energy consumption of ECDSA, ECIES, and ECDH w/ all optimization switches disabled 7. Related Work A comprehensive guide for elliptic curve cryptography is given in =-=[20]-=-. A brief introduction to ECC can be found in [41]. Additional documentation on ECC can be found in [9–11]. There have been numerous ECC implementations in various contexts (e.g., Crypto++ [13], OpenS... |

377 | A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
- Du, Deng, et al.
- 2005
(Show Context)
Citation Context ...niques that can bypass PKC operations in sensor network applications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., =-=[12, 16, 17, 27, 29]-=-) and broadcast authentication (e.g., [28, 30, 38]). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-di... |

376 | Establishing Pairwise Keys in Distributed Sensor Networks
- Liu, Ning, et al.
- 2005
(Show Context)
Citation Context |

254 | Efficient Authentication and Signing of Multicast Streams over Lossy Channels
- Perrig, Canetti, et al.
- 2000
(Show Context)
Citation Context ...key establishment between any two nodes and tolerate arbitrary node compromises at the same time. As another example, the aforementioned broadcast authentication schemes, which are all based on TESLA =-=[37]-=-, require loose time synchronization, which itself is a challenging task to achieve in wireless sensor networks. In contrast, PKC can address all these problems easily. Pairwise key establishment can ... |

187 | A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
- Malan, Welsh, et al.
- 2004
(Show Context)
Citation Context ...ng time synchronization. Thus, it is desirable to explore the application of PKC on resource constrained sensor platforms. There have been a few recent attempts to use PKC in wireless sensor networks =-=[19, 26, 31, 40]-=-, which demonstrate that it is feasible to perform limited PKC operations on the currentsensor platforms such as MICAz motes [2]. Elliptic Curve Cryptography (ECC) has been the top choice among vario... |

133 | Comparing elliptic curve cryptography and RSA on 8-bit CPUs
- Gura, Patel, et al.
- 2004
(Show Context)
Citation Context ...ng time synchronization. Thus, it is desirable to explore the application of PKC on resource constrained sensor platforms. There have been a few recent attempts to use PKC in wireless sensor networks =-=[19, 26, 31, 40]-=-, which demonstrate that it is feasible to perform limited PKC operations on the currentsensor platforms such as MICAz motes [2]. Elliptic Curve Cryptography (ECC) has been the top choice among vario... |

105 |
Encapsulating Security Payload
- Kent, “IP
- 2005
(Show Context)
Citation Context ...ork applications. In traditional networks such as the Internet, Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols (e.g., SSL [4] and IPsec =-=[21, 22]-=-). However, in wireless sensor networks, PKC has not been widely adopted due to the resource constraints on sensor platforms, particularly the limited and depleteable battery power. There has been int... |

47 |
TinyECC: Elliptic curve cryptography for sensor networks
- Ning, Liu
(Show Context)
Citation Context ...ng time synchronization. Thus, it is desirable to explore the application of PKC on resource constrained sensor platforms. There have been a few recent attempts to use PKC in wireless sensor networks =-=[19, 26, 31, 40]-=-, which demonstrate that it is feasible to perform limited PKC operations on the currentsensor platforms such as MICAz motes [2]. Elliptic Curve Cryptography (ECC) has been the top choice among vario... |

33 | Multilevel µTESLA: Broadcast authentication for distributed sensor networks
- LIU, NING
(Show Context)
Citation Context ...plications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., [12, 16, 17, 27, 29]) and broadcast authentication (e.g., =-=[28, 30, 38]-=-). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-distribution schemes can guarantee key establishment... |

31 | Efficient implementation of public key cryptosystems on mote sensors (Short Paper - Wang, Li - 2006 |

30 | Sluice: Secure dissemination of code updates in sensor networks
- Lanigan, Gandhi, et al.
- 2006
(Show Context)
Citation Context ...imization techniques discussed earlier. TinyECC has been released publicly at http:// discovery.csc.ncsu.edu/software/TinyECC/. Some preliminary versions have been adopted by other researchers (e.g., =-=[14, 25, 32]-=-). As discussed earlier, starting from the current version, we added a set of optimization switches to provide flexible configuration of TinyECC so that it can be integrated into sensor applications w... |

27 | Practical broadcast authentication in sensor networks
- Liu, Ning, et al.
(Show Context)
Citation Context ...plications. For example, there has been a substantial amount of research on random key pre-distribution for pairwise key establishment (e.g., [12, 16, 17, 27, 29]) and broadcast authentication (e.g., =-=[28, 30, 38]-=-). However, these alternative approaches do not offer the same degree of security or functionality as PKC. For instance, none of the random key pre-distribution schemes can guarantee key establishment... |

26 | Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks
- Liu, Ning
- 2005
(Show Context)
Citation Context |

25 |
Standards for Efficient Cryptography — SEC 1: Recommended Elliptic Curve Domain Parameters. Available at http://www.secg. org/secg_docs.htm
- research
- 2000
(Show Context)
Citation Context ... compact signatures. For example, to provide equivalent security to 1024-bit RSA, an ECC scheme only needs 160 bits on various parameters, such as 160-bit finite field operations and 160-bit key size =-=[10]-=-. Despite the recent progress on ECC implementations on sensor platforms, all the previous attempts [19, 31, 40] have limitations. In particular, all these attempts were developed as independent packa... |

25 | Secure code distribution in dynamically programmable wireless sensor networks
- Deng, Han, et al.
- 2006
(Show Context)
Citation Context ...imization techniques discussed earlier. TinyECC has been released publicly at http:// discovery.csc.ncsu.edu/software/TinyECC/. Some preliminary versions have been adopted by other researchers (e.g., =-=[14, 25, 32]-=-). As discussed earlier, starting from the current version, we added a set of optimization switches to provide flexible configuration of TinyECC so that it can be integrated into sensor applications w... |

17 |
Standads for Efficient Cryptography (SEC) 2: Recommended Elliptic Curve Domain Parameters, version 1.0 edition
- Research
- 2000
(Show Context)
Citation Context ...t Cryptography [10]. Moreover, TinyECC also includes elliptic curve parameters recommended by SECG (Stands for Efficient Cryptography Group), such as secp160k1, secp160r1 and secp160r2, as defined in =-=[11]-=-. Portability: TinyECC should run on as many sensor platforms as possible. Due to this reason, we choose to implement TinyECC on TinyOS [6], which is a popular, open-source OS for networked sensors. A... |

16 |
Addressing Security in Medical Sensor Networks,” HealthNet ’07
- Malasri, Wang
- 2007
(Show Context)
Citation Context ...imization techniques discussed earlier. TinyECC has been released publicly at http:// discovery.csc.ncsu.edu/software/TinyECC/. Some preliminary versions have been adopted by other researchers (e.g., =-=[14, 25, 32]-=-). As discussed earlier, starting from the current version, we added a set of optimization switches to provide flexible configuration of TinyECC so that it can be integrated into sensor applications w... |

14 | Mitigating dos attacks against broadcast authentication in wireless sensor networks - Ning, Liu, et al. |

11 | Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks - Hyun, Ning, et al. - 2008 |

6 |
RSAREF: A Cryptographic Toolkit," version 2.0
- Laboratories
- 1994
(Show Context)
Citation Context ...vided inline assembly implementation of some critical operations, such as large integer multiplications. To save implementation efforts, we ported the C code of large integer operations in RSAREF 2.0 =-=[24]-=- to nesC code on TinyOS. These include modular addition, subtraction, multiplication, division, inverse, and exponentiation operations. We then implemented all the elliptic curve operations and the op... |

3 |
Crypto++ library 5.5. http://www.cryptopp.com
- Dai
- 2007
(Show Context)
Citation Context ...ven in [20]. A brief introduction to ECC can be found in [41]. Additional documentation on ECC can be found in [9–11]. There have been numerous ECC implementations in various contexts (e.g., Crypto++ =-=[13]-=-, OpenSSL [3], MIRACL [39], NSS [34]). Most of these implementations are aimed at traditional computing platforms such as PCs. Several recent efforts have focused on sensor platforms, such as the Mica... |

2 |
Network security service (NSS). http://www.mozilla.org/projects/ security/pki/nss
- Mozilla
(Show Context)
Citation Context ... ECC can be found in [41]. Additional documentation on ECC can be found in [9–11]. There have been numerous ECC implementations in various contexts (e.g., Crypto++ [13], OpenSSL [3], MIRACL [39], NSS =-=[34]-=-). Most of these implementations are aimed at traditional computing platforms such as PCs. Several recent efforts have focused on sensor platforms, such as the Mica series of motes. Malan et al. imple... |

2 |
Multiprecision integer and rational arithmetic c/c++ library (MIRACL),” http://www.shamus.ie
- Software
(Show Context)
Citation Context ...duction to ECC can be found in [41]. Additional documentation on ECC can be found in [9–11]. There have been numerous ECC implementations in various contexts (e.g., Crypto++ [13], OpenSSL [3], MIRACL =-=[39]-=-, NSS [34]). Most of these implementations are aimed at traditional computing platforms such as PCs. Several recent efforts have focused on sensor platforms, such as the Mica series of motes. Malan et... |

1 |
Efficient implementation of public key 16 on mote sensors
- Wang, Li
- 2006
(Show Context)
Citation Context |

1 |
Elliptic curve cryptography. http: //en.wikipedia.org/wiki/Elliptic_curve_ cryptography
- Wikipedia
(Show Context)
Citation Context ... protocol (ECDH), and a public key encryption scheme (ECIES). These cover all typical uses of PKC. 3. Background on ECC In this section, we give a brief introduction to ECC. The reader is referred to =-=[20, 41]-=- for more details. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields [41]. Elliptic curves used in cryp... |