Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/121616
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Hash functions and benchmarks for resource constrained passive devices: A preliminary study
Author: Su, Y.
Gao, Y.
Kavehei, O.
Ranasinghe, D.C.
Citation: Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications Workshops, 2019, pp.1020-1025
Publisher: IEEE
Issue Date: 2019
Series/Report no.: International Conference on Pervasive Computing and Communications
ISBN: 9781538691519
ISSN: 2474-2503
Conference Name: IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom) (11 Mar 2019 - 15 Mar 2019 : Kyoto, Japan)
Statement of
Responsibility: 
Yang Su, Yansong Gao, Omid Kavehei, and Damith C. Ranasinghe
Abstract: Recently, we have witnessed the emergence of intermittently powered computational devices, an early example is the Intel WISP (Wireless Identification and Sensing Platform). How we engineer basic security services to realize mutual authentication, confidentiality and preserve privacy of information collected, stored and transmitted by, and establish the veracity of measurements taken from, such devices remain an open challenge; especially for batteryless and intermittently powered devices. While the cryptographic community has significantly progressed lightweight (in terms of area overhead) security primitives for low cost and power efficient hardware implementations, lightweight software implementations of security primitives for resource constrained devices are less investigated. Especially, the problem of providing security for intermittently powered computational devices is unexplored. In this paper, we illustrate the unique challenges posed by an emerging class of intermittently powered and energy constrained computational IoT devices for engineering security solutions. We focus on the construction and evaluation of a basic hash primitive—both existing cryptographic hash functions and non-cryptographic hash functions built upon lightweight block ciphers. We provide software implementation benchmarks for eight primitives on a low power and resource limited computational device, and outline an execution model for these primitives under intermittent powering.
Keywords: Hash functions; benchmarks; ultra low power microcontrollers; power harvesting; computational RFID; intermittently powered devices; energy constrained devices; intermittent execution model
Description: SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things
Rights: © 2019 IEEE
DOI: 10.1109/PERCOMW.2019.8730835
Grant ID: http://purl.org/au-research/grants/arc/DP140103448
Published version: http://dx.doi.org/10.1109/percomw.2019.8730835
Appears in Collections:Aurora harvest 8
Civil and Environmental Engineering publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.