Asymmetric-Key Cryptography for Contiki

Examensarbete för masterexamen

Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.12380/129176
Download file(s):
File Description SizeFormat 
129176.pdfFulltext1.64 MBAdobe PDFView/Open
Type: Examensarbete för masterexamen
Master Thesis
Title: Asymmetric-Key Cryptography for Contiki
Authors: Hassan, Razi
Qamar, Toheed
Abstract: Wireless Sensor Networks have become a core component in much diverse application range which extends from just a forest temperature monitoring to monitoring in many power plants. With this increased dependency on WSN and its association to current internet, hardened security primitives are required to ensure the correct behaviour of sensor nodes on its own and as a whole network. Public-Key Cryptography was considered too expensive for WSN but it all changed due to the advancements in software and hardware prototypes. In this thesis different pubic key cryptographic approaches have been analysed, that can be used with Contiki. Contiki is a new but popular operating system used in WSN. Using public key cryptography in wireless sensor networks has its own negative aspects like more energy utilization, requirement of more RAM and ROM space. To investigate the feasibility of public key cryptography, different cryptographic libraries were analysed, out of them two libraries, LibtomCrypt & Relic were selected for evaluation. After a methodical review and code reduction these libraries were ported to Contiki, the code reduction was carried out to minimize the use of different resources by these libraries while running on top of Contiki. For evaluation of these libraries with Contiki, MSB430 mote and simulation based Tmote Sky is used. Results have shown that public key cryptography is possible, and fewer efforts are required to use it with Contiki. Factors like processor speed and RAM size lead to better results in case of such integrations. It is also observed that use of many mathematical optimizations provided with these algorithms can significantly help in performance increase.
Keywords: Information Technology;Informationsteknik
Issue Date: 2010
Publisher: Chalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)
Chalmers University of Technology / Department of Computer Science and Engineering (Chalmers)
URI: https://hdl.handle.net/20.500.12380/129176
Collection:Examensarbeten för masterexamen // Master Theses



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.