{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:13Z","timestamp":1755998833705},"reference-count":39,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2010,1,1]]},"abstract":"<jats:p> Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. Two setups have been created to compare the software- and hardware-supported approaches. According to the results, the FPGA-based ECC implementation requires three orders of magnitude less energy, compared with a low power microcontroller implementation, even considering the power consumption overhead introduced by the hardware reconfiguration. <\/jats:p>","DOI":"10.1155\/2010\/740823","type":"journal-article","created":{"date-parts":[[2010,11,7]],"date-time":"2010-11-07T19:34:02Z","timestamp":1289158442000},"page":"740823","source":"Crossref","is-referenced-by-count":28,"title":["Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors"],"prefix":"10.1177","volume":"6","author":[{"given":"J.","family":"Portilla","sequence":"first","affiliation":[{"name":"Centro de Electronica Industrial, Universidad Politecnica de Madrid, Jose Gutierrez Abascal 2, 28006 Madrid, Spain"}]},{"given":"A.","family":"Otero","sequence":"additional","affiliation":[{"name":"Centro de Electronica Industrial, Universidad Politecnica de Madrid, Jose Gutierrez Abascal 2, 28006 Madrid, Spain"}]},{"given":"E.","family":"de la Torre","sequence":"additional","affiliation":[{"name":"Centro de Electronica Industrial, Universidad Politecnica de Madrid, Jose Gutierrez Abascal 2, 28006 Madrid, Spain"}]},{"given":"T.","family":"Riesgo","sequence":"additional","affiliation":[{"name":"Centro de Electronica Industrial, Universidad Politecnica de Madrid, Jose Gutierrez Abascal 2, 28006 Madrid, Spain"}]},{"given":"O.","family":"Stecklina","sequence":"additional","affiliation":[{"name":"IHP, Im Technologiepark 25, 15236 Frankfurt, Germany"}]},{"given":"S.","family":"Peter","sequence":"additional","affiliation":[{"name":"IHP, Im Technologiepark 25, 15236 Frankfurt, Germany"}]},{"given":"P.","family":"Langend\u00f6rfer","sequence":"additional","affiliation":[{"name":"IHP, Im Technologiepark 25, 15236 Frankfurt, Germany"}]}],"member":"179","published-online":{"date-parts":[[2010,1,1]]},"reference":[{"key":"B1-2010-740823","doi-asserted-by":"publisher","DOI":"10.1080\/15501320601062114"},{"key":"B2-2010-740823","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"B3-2010-740823","first-page":"162","volume-title":"Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys \u203204)","author":"Karlof C."},{"key":"B4-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236421"},{"key":"B5-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"B6-2010-740823","first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CSS \u203202)","author":"Eschenauer L."},{"key":"B7-2010-740823","first-page":"43","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN \u203204)","author":"Hwang J."},{"key":"B8-2010-740823","first-page":"197","volume-title":"Proceedings of the IEEE Symposium on Security And Privacy","author":"Chan H."},{"key":"B9-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"B10-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"},{"key":"B11-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.106"},{"key":"B12-2010-740823","doi-asserted-by":"publisher","DOI":"10.1080\/15501320701205225"},{"key":"B25-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2009.5172547"},{"key":"B13-2010-740823","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011772"},{"key":"B15-2010-740823","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES \u203204)","volume":"3156","author":"Gura N."},{"key":"B16-2010-740823","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"B17-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"B18-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514276"},{"key":"B14-2010-740823","first-page":"519","volume-title":"Proceedings of the International Conference on Information and Communication Security (ICICS \u203206)","author":"Wang H."},{"key":"B19-2010-740823","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"key":"B20-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2009.39"},{"key":"B21-2010-740823","first-page":"463","volume-title":"IET Irish Signals and Systems Conference","author":"Murphy G."},{"key":"B26-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"B27-2010-740823","first-page":"298","volume-title":"Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems (SenSys \u203205)","author":"Adler R."},{"key":"B28-2010-740823","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127835"},{"key":"B29-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2006.56"},{"key":"B30-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2008.4547743"},{"key":"B31-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/WCSN.2008.4772684"},{"key":"B32-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515781"},{"key":"B33-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/SSST.2008.4480210"},{"key":"B34-2010-740823","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.12.045"},{"key":"B35-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364433"},{"key":"B36-2010-740823","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71528-3_21"},{"key":"B37-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2006.30"},{"key":"B38-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2006.379687"},{"key":"B41-2010-740823","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"B22-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.67"},{"key":"B23-2010-740823","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364469"},{"key":"B40-2010-740823","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011775"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2010\/740823","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2010\/740823","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2010\/740823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T07:55:55Z","timestamp":1604649355000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2010\/740823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1,1]]}},"alternative-id":["10.1155\/2010\/740823"],"URL":"https:\/\/doi.org\/10.1155\/2010\/740823","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}