Asymmetric-Key Cryptography for Contiki

dc.contributor.authorHassan, Razi
dc.contributor.authorQamar, Toheed
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)sv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineering (Chalmers)en
dc.date.accessioned2019-07-03T12:28:00Z
dc.date.available2019-07-03T12:28:00Z
dc.date.issued2010
dc.description.abstractWireless Sensor Networks have become a core component in much diverse application range which extends from just a forest temperature monitoring to monitoring in many power plants. With this increased dependency on WSN and its association to current internet, hardened security primitives are required to ensure the correct behaviour of sensor nodes on its own and as a whole network. Public-Key Cryptography was considered too expensive for WSN but it all changed due to the advancements in software and hardware prototypes. In this thesis different pubic key cryptographic approaches have been analysed, that can be used with Contiki. Contiki is a new but popular operating system used in WSN. Using public key cryptography in wireless sensor networks has its own negative aspects like more energy utilization, requirement of more RAM and ROM space. To investigate the feasibility of public key cryptography, different cryptographic libraries were analysed, out of them two libraries, LibtomCrypt & Relic were selected for evaluation. After a methodical review and code reduction these libraries were ported to Contiki, the code reduction was carried out to minimize the use of different resources by these libraries while running on top of Contiki. For evaluation of these libraries with Contiki, MSB430 mote and simulation based Tmote Sky is used. Results have shown that public key cryptography is possible, and fewer efforts are required to use it with Contiki. Factors like processor speed and RAM size lead to better results in case of such integrations. It is also observed that use of many mathematical optimizations provided with these algorithms can significantly help in performance increase.
dc.identifier.urihttps://hdl.handle.net/20.500.12380/129176
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectInformation Technology
dc.subjectInformationsteknik
dc.titleAsymmetric-Key Cryptography for Contiki
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster Thesisen
dc.type.uppsokH
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
129176.pdf
Storlek:
1.6 MB
Format:
Adobe Portable Document Format
Beskrivning:
Fulltext