Font Size: a A A

Research Of Security Algorithm In IRIS Node

Posted on:2016-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:S H MaFull Text:PDF
GTID:2298330467975418Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As having a great prospect of application, wireless sensor networks (WSN) haveattracted more and more attentions. In general fields, no security is required in WSN. But insome special fields, the security of WSN is essential. And data security is a very importantissue in the security of WSN. TinyECC makes elliptic curve cryptography (ECC) firstlyimplement in a wireless sensor node, which is developed by An Liu, Peng Ning et al. By now,TinyECC has runned in TelosB, MICAz, Tomte Sky and Imote2successfully.After analysing IRIS and changing TinyECC program, this paper proposes threewell-known ECC schemes which can run in IRIS successfully. They are elliptic curveintegrated encryption scheme (ECIES), elliptic curve digital signature algorithm (ECDSA)and elliptic curve Diffie-Hellman key agreement scheme (ECDH). After running in IRISsuccessfully, the three schemes are tested in IRIS. The tests include the space complexity andthe time complexity. And the time complexity of ECIES includes initialization time,encryption time and decryption time, the time complexity of ECDSA includes initializationtime, signature generation time and signature verification time, the time complexity of ECDHincludes initialization time and key establishment time.Furthermore, this paper finds seven kinds of optimization algorithms used inoptimizations of ECC. They include Barrett reduction, hybrid multiplication, hybrid squaring,projective coordinate systems, sliding window, Shamir’s trick and curve specific optimization.There are two kinds of testing methods. The first one is to test optimization algorithmsseparately to get its optimization effect. The second one is to get optimization effect by tun onall other optimization algorithms and turn off the testing optimization algorithm. In order toimprove the credibility of these results, this paper carried out10times for each test. The finalresults are the arithmetic average value of the10results.After all, the test results in IRIS are compared with the test results on other four nodes(MICAz, TelosB, Tomte Sky, Imote2). At last, this paper puts forward the most commonlydesirable configurations for IRIS by analyzing test results.
Keywords/Search Tags:security algorithm, TinyECC, IRIS node, ECIES, ECDSA, ECDH
PDF Full Text Request
Related items