Cart (Loading....) | Create Account
Close category search window
 

Over the air provisioning of industrial wireless devices using elliptic curve cryptography

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

9 Author(s)
Deji Chen ; Technol. Dept., PSS Emerson Process Manage., Austin, TX, USA ; Nixon, M. ; Lin, T. ; Song Han
more authors

Security has become a key consideration in industrial settings. Newer technologies, such as wireless sensor networks, have adopted the position that security is mandatory. For wireless sensor applications it is important to secure data in transit in the air, to authenticate data originating from, or arriving at the wireless devices and applications, and, most important, to protect the safety and integrity of the legacy process control and plant safeguarding systems that the new wireless world interconnects into. Current industrial wireless mesh networks, such as WirelessHART™, ISA100.11a, and WIA-PA, have adopted AES 128 bit encryption for both securing communications and data. To ensure that devices and applications are authenticated special join keys are used. The process of loading these keys is called provisioning. To ensure that join keys remain secret they are loaded offline through special wired interfaces or provisioned over the air using less secure mechanisms. What is needed is a low cost efficient public key mechanism that can be utilized over the air while not compromising security. This paper examines the use of elliptic curve cryptography for this purpose. We realize this technique on a WirelessHART mesh network. Efforts are underway to incorporate this approach as an addition to the WirelessHART standard.

Published in:

Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on  (Volume:2 )

Date of Conference:

10-12 June 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.