
Proceedings Paper
Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systemsFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are
subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often
times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices,
which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key
algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for
which lightweight implementations exist for even very resource constrained devices. However, all system devices must
use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms
(PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide
authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained
embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the
size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or
other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has
teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop
an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on
resource constrained embedded devices, without the burden of large amounts of key distribution or storage.
Paper Details
Date Published: 28 May 2013
PDF: 8 pages
Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 875510 (28 May 2013); doi: 10.1117/12.2015434
Published in SPIE Proceedings Vol. 8755:
Mobile Multimedia/Image Processing, Security, and Applications 2013
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)
PDF: 8 pages
Proc. SPIE 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013, 875510 (28 May 2013); doi: 10.1117/12.2015434
Show Author Affiliations
Ron Knobler, McQ, Inc. (United States)
Peter Scheffel, McQ, Inc. (United States)
Scott Jackson, McQ, Inc. (United States)
Peter Scheffel, McQ, Inc. (United States)
Scott Jackson, McQ, Inc. (United States)
Kris Gaj, George Mason Univ. (United States)
Jens Peter Kaps, George Mason Univ. (United States)
Jens Peter Kaps, George Mason Univ. (United States)
Published in SPIE Proceedings Vol. 8755:
Mobile Multimedia/Image Processing, Security, and Applications 2013
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)
© SPIE. Terms of Use
