next up previous
Next: Requirements for Sensor Network Up: System Assumptions Previous: Trust Requirements

Full paper: Postscript, PS.GZ, PDF


Design Guidelines

With the limited computation resources available on our platform, we cannot afford to use asymmetric cryptography and so we use symmetric cryptographic primitives to construct the SPINSprotocols. Due to the limited program store, we construct all cryptographic primitives (i.e. encryption, message authentication code (MAC), hash, random number generator) out of a single block cipher for code reuse. To reduce communication overhead we exploit common state between the communicating parties.


next up previous
Next: Requirements for Sensor Network Up: System Assumptions Previous: Trust Requirements

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001