{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:47:01Z","timestamp":1768528021159,"version":"3.49.0"},"reference-count":66,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T00:00:00Z","timestamp":1493337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Italian MIUR"},{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Sapienza Research Grants for Young Investigators"},{"name":"National Technological Cluster","award":["CTN001 0034 23154 Social Museum and Smart Tourism"],"award-info":[{"award-number":["CTN001 0034 23154 Social Museum and Smart Tourism"]}]},{"name":"PON project","award":["PON03PE00214"],"award-info":[{"award-number":["PON03PE00214"]}]},{"name":"MIUR project SMARTOUR: INTELLIGENT PLATFORM FOR TOURISM"},{"name":"Google Faculty Research Award and an IBM Faculty"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>\n            This work is motivated by a general question: can micro-scale energy-harvesting techniques be exploited to support low-cost\n            <jats:italic>standard<\/jats:italic>\n            security solutions on resource-constrained devices? We focus on guaranteeing integrity and authentication in Internet of Things (IoT) and Wireless Sensor Network (WSN) applications. In this article, we propose techniques to make ECDSA signatures low cost and implementable on resource-constrained devices. By combining precomputation techniques and energy-harvesting capabilities of modern sensor nodes, we achieve significant improvement over prior works. In addition, we show that the cost of ECDSA signatures can be reduced by up to a factor 10 by using harvesting-aware optimizations.\n          <\/jats:p>","DOI":"10.1145\/2994603","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T12:38:23Z","timestamp":1493383103000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks"],"prefix":"10.1145","volume":"16","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[{"name":"University of Rome \u201cLa Sapienza\u201d, Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[{"name":"University of Rome Tor Vergata, Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Angelo T.","family":"Capossele","sequence":"additional","affiliation":[{"name":"University of Rome \u201cLa Sapienza\u201d, Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chiara","family":"Petrioli","sequence":"additional","affiliation":[{"name":"University of Rome \u201cLa Sapienza\u201d, Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-7154","authenticated-orcid":false,"given":"Dora","family":"Spenza","sequence":"additional","affiliation":[{"name":"University of Rome \u201cLa Sapienza\u201d, Rome, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,4,28]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 1st International Workshop on the Security of the Internet of Things (SecIoT'10)","author":"Alcaraz Cristina","year":"2010","unstructured":"Cristina Alcaraz , Pablo Najera , Javier Lopez , and Rodrigo Roman . 2010 . Wireless sensor networks and the internet of things: Do we need a complete integration? In Proceedings of the 1st International Workshop on the Security of the Internet of Things (SecIoT'10) . Cristina Alcaraz, Pablo Najera, Javier Lopez, and Rodrigo Roman. 2010. Wireless sensor networks and the internet of things: Do we need a complete integration? In Proceedings of the 1st International Workshop on the Security of the Internet of Things (SecIoT'10)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.3240050203"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 20th Annual Network 8 Distributed System Security Symposium (NDSS'13)","author":"Ateniese Giuseppe","year":"2013","unstructured":"Giuseppe Ateniese , Giuseppe Bianchi , Angelo Capossele , and Chiara Petrioli . 2013 . Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques? In Proceedings of the 20th Annual Network 8 Distributed System Security Symposium (NDSS'13) . Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, and Chiara Petrioli. 2013. Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques? In Proceedings of the 20th Annual Network 8 Distributed System Security Symposium (NDSS'13)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2500570"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118511305.ch20"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534208.2534215"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.013"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.018"},{"key":"e_1_2_1_10_1","volume-title":"Encyclopedia of Structural Health Monitoring","author":"Bischoff Reinhard","unstructured":"Reinhard Bischoff , Jonas Meyer , and Glauco Feltrin . 2009. Wireless sensor network platforms . In Encyclopedia of Structural Health Monitoring . John Wiley 8 Sons. Reinhard Bischoff, Jonas Meyer, and Glauco Feltrin. 2009. Wireless sensor network platforms. In Encyclopedia of Structural Health Monitoring. John Wiley 8 Sons."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322318"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054129"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47555-9_18"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517413"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2587220"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248379"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 8th GI\/ITG KuVS Fachgespr\u00e4ch &Duml;rahtlose Sensornetz\u00eb","author":"Christin Delphine","year":"2009","unstructured":"Delphine Christin , Andreas Reinhardt , Parag Mogre , and Ralf Steinmetz . 2009 . Wireless sensor networks and the internet of things: Selected challenges . In Proceedings of the 8th GI\/ITG KuVS Fachgespr\u00e4ch &Duml;rahtlose Sensornetz\u00eb , Hamburg, Germany, Technische Universit\u00e4t Hamburg-Harburg Institut f\u00fcr Telematik (Ed.). 31--34. Delphine Christin, Andreas Reinhardt, Parag Mogre, and Ralf Steinmetz. 2009. Wireless sensor networks and the internet of things: Selected challenges. In Proceedings of the 8th GI\/ITG KuVS Fachgespr\u00e4ch &Duml;rahtlose Sensornetz\u00eb, Hamburg, Germany, Technische Universit\u00e4t Hamburg-Harburg Institut f\u00fcr Telematik (Ed.). 31--34."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20177"},{"key":"e_1_2_1_19_1","volume-title":"Selected Areas in Cryptography","author":"Coron Jean Sebastien","unstructured":"Jean Sebastien Coron , David M. Raihi , and Christophe Tymen . 2001. Fast generation of pairs (k, [k]P) for Koblitz elliptic curves . In Selected Areas in Cryptography . Springer-Verlag , London, UK , 151--164. Jean Sebastien Coron, David M. Raihi, and Christophe Tymen. 2001. Fast generation of pairs (k, [k]P) for Koblitz elliptic curves. In Selected Areas in Cryptography. Springer-Verlag, London, UK, 151--164."},{"key":"e_1_2_1_20_1","unstructured":"Crossbow Technology. 2003. MICA2 MOTE PLATFORM Datasheet. (2003). Document Part Number: 6020-0042-04.  Crossbow Technology. 2003. MICA2 MOTE PLATFORM Datasheet. (2003). Document Part Number: 6020-0042-04."},{"key":"e_1_2_1_21_1","unstructured":"Crossbow Technology. 2004. TELOSB MOTE PLATFORM Datasheet. (2004). Document Part Number: 6020-0094-01 Rev B.  Crossbow Technology. 2004. TELOSB MOTE PLATFORM Datasheet. (2004). Document Part Number: 6020-0094-01 Rev B."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043662.2043665"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_10"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352539"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_20"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463193"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2220336.2220347"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the 7th Conference on USENIX Security Symposium (USENIX SSYM'98)","volume":"7","author":"Don","unstructured":"Don B. Johnson and Alfred J. Menezes. 1998. Elliptic curve DSA (ECSDA): an enhanced DSA . In Proceedings of the 7th Conference on USENIX Security Symposium (USENIX SSYM'98) . Vol. 7 . 13--23. Don B. Johnson and Alfred J. Menezes. 1998. Elliptic curve DSA (ECSDA): an enhanced DSA. In Proceedings of the 7th Conference on USENIX Security Symposium (USENIX SSYM'98). Vol. 7. 13--23."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7180517"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274870"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534208.2534221"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069361"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.032812.110433"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_10"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080110"},{"key":"e_1_2_1_39_1","first-page":"1234","article-title":"New explicit conditions of elliptic curve traces for FR-reduction","volume":"84","author":"Miyaji Atsuko","year":"2001","unstructured":"Atsuko Miyaji , Masaki Nakabayashi , and Shunzou Takano . 2001 . New explicit conditions of elliptic curve traces for FR-reduction . IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 84 , 5 (2001), 1234 -- 1243 . Atsuko Miyaji, Masaki Nakabayashi, and Shunzou Takano. 2001. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 84, 5 (2001), 1234--1243.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2536747.2536758"},{"key":"e_1_2_1_41_1","volume-title":"Technical Report SING-08-00. Stanford","author":"Moss D.","year":"2008","unstructured":"D. Moss and P. Levis . 2008 . BoX-MACs: Exploiting Physical and Link Layer Boundaries in Low-power Networking. Technical Report SING-08-00. Stanford University, Stanford, CA. D. Moss and P. Levis. 2008. BoX-MACs: Exploiting Physical and Link Layer Boundaries in Low-power Networking. Technical Report SING-08-00. Stanford University, Stanford, CA."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_16"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the Workshop on Computer Number Theory and Cryptology. Springer, 1--16","author":"Nguyen Phong","year":"1999","unstructured":"Phong Nguyen , Igor Shparlinski , and Jacques Stern . 1999 . Distribution of modular sums and the security of server aided exponentiation . In Proceedings of the Workshop on Computer Number Theory and Cryptology. Springer, 1--16 . Phong Nguyen, Igor Shparlinski, and Jacques Stern. 1999. Distribution of modular sums and the security of server aided exponentiation. In Proceedings of the Workshop on Computer Number Theory and Cryptology. Springer, 1--16."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_3"},{"key":"e_1_2_1_45_1","volume-title":"Measurement and Instrumentation Data Center","author":"NREL","year":"2011","unstructured":"NREL : Measurement and Instrumentation Data Center . 2011 . NREL : Measurement and Instrumentation Data Center . Retrieved from http:\/\/www.nrel.gov\/midc\/. NREL: Measurement and Instrumentation Data Center. 2011. NREL: Measurement and Instrumentation Data Center. Retrieved from http:\/\/www.nrel.gov\/midc\/."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13066-8_8"},{"key":"e_1_2_1_47_1","first-page":"125","article-title":"MagoNode: Advantages of RF front-ends in wireless sensor networks","volume":"281","author":"Paoli Mario","year":"2014","unstructured":"Mario Paoli , Antonio Lo Russo , Ugo Maria Colesanti , and Andrea Vitaletti . 2014 . MagoNode: Advantages of RF front-ends in wireless sensor networks . In Real-World Wireless Sensor Networks. Vol. 281. 125 -- 137 . Mario Paoli, Antonio Lo Russo, Ugo Maria Colesanti, and Andrea Vitaletti. 2014. MagoNode: Advantages of RF front-ends in wireless sensor networks. In Real-World Wireless Sensor Networks. Vol. 281. 125--137.","journal-title":"Real-World Wireless Sensor Networks."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460708"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594791"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 1st IEEE International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace 8 Electronic Systems Technology (Wireless VITAE'09)","author":"Piorno Joaquin Recas","year":"2009","unstructured":"Joaquin Recas Piorno , Carlo Bergonzini , David Atienza , and Tajana Simunic Rosing . 2009 . Prediction and management in energy harvested wireless sensor nodes . In Proceedings of the 1st IEEE International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace 8 Electronic Systems Technology (Wireless VITAE'09) . 6--10. Joaquin Recas Piorno, Carlo Bergonzini, David Atienza, and Tajana Simunic Rosing. 2009. Prediction and management in energy harvested wireless sensor nodes. In Proceedings of the 1st IEEE International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace 8 Electronic Systems Technology (Wireless VITAE'09). 6--10."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.2.128-142"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566675"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053453"},{"key":"e_1_2_1_55_1","unstructured":"Sensirion AG. 2011. SHT1x Datasheet: Humidity and Temperature Sensor IC. Available at: https:\/\/cdn.sparkfun.com\/datasheets\/Sensors\/Pressure\/Sensirion_Humidity_SHT1x_Datasheet_V5.pdf.  Sensirion AG. 2011. SHT1x Datasheet: Humidity and Temperature Sensor IC. Available at: https:\/\/cdn.sparkfun.com\/datasheets\/Sensors\/Pressure\/Sensirion_Humidity_SHT1x_Datasheet_V5.pdf."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448556.2448605"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27317-9_33"},{"key":"e_1_2_1_58_1","volume-title":"Working Draft. (December 30","author":"Shelby Zach","year":"2013","unstructured":"Zach Shelby , Klaus Hartke , and Carsten Bormann . 2013 . Constrained Application Protocol (CoAP) . Working Draft. (December 30 , 2013). Zach Shelby, Klaus Hartke, and Carsten Bormann. 2013. Constrained Application Protocol (CoAP). Working Draft. (December 30, 2013)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306223194"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218419"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the 2010 IEEE International Conference on Security and Cryptography (SECRYPT'10)","author":"Taddeo Antonio Vincenzo","year":"2010","unstructured":"Antonio Vincenzo Taddeo , Marcello Mura , and Alberto Ferrante . 2010 . QoS and security in energy-harvesting wireless sensor networks . In Proceedings of the 2010 IEEE International Conference on Security and Cryptography (SECRYPT'10) . 1--10. Antonio Vincenzo Taddeo, Marcello Mura, and Alberto Ferrante. 2010. QoS and security in energy-harvesting wireless sensor networks. In Proceedings of the 2010 IEEE International Conference on Security and Cryptography (SECRYPT'10). 1--10."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAPE.2009.5355821"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744815"},{"key":"e_1_2_1_65_1","volume-title":"Securing wireless sensor networks: A survey","author":"Zhou Yun","year":"2008","unstructured":"Yun Zhou , Yuguang Fang , and Yanchao Zhang . 2008. Securing wireless sensor networks: A survey . IEEE Communications Surveys 8 Tutorials 10, 3 ( 2008 ), 6--28. Yun Zhou, Yuguang Fang, and Yanchao Zhang. 2008. Securing wireless sensor networks: A survey. IEEE Communications Surveys 8 Tutorials 10, 3 (2008), 6--28."},{"key":"e_1_2_1_66_1","first-page":"53","article-title":"A lightweight security framework for wireless sensor networks","volume":"2","author":"Zia T. A.","year":"2011","unstructured":"T. A. Zia and A. Y. Zomaya . 2011 . A lightweight security framework for wireless sensor networks . Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2 , 3 (2011), 53 -- 73 . T. A. Zia and A. Y. Zomaya. 2011. A lightweight security framework for wireless sensor networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2, 3 (2011), 53--73.","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2994603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:48Z","timestamp":1750217988000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,28]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/2994603"],"URL":"https:\/\/doi.org\/10.1145\/2994603","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,28]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}