Next Article in Journal
SLAE–CPS: Smart Lean Automation Engine Enabled by Cyber-Physical Systems Technologies
Next Article in Special Issue
An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels
Previous Article in Journal
A Force-Sensing System on Legs for Biomimetic Hexapod Robots Interacting with Unstructured Terrain
Previous Article in Special Issue
Statistical Analysis of the Main Configuration Parameters of the Network Dynamic and Adaptive Radio Protocol (DARP)
Article Menu
Issue 7 (July) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(7), 1517;

Algorithms for Lightweight Key Exchange

Department of Computer Science and Artificial Intelligence, University of Alicante, 03690 Alicante, Spain
Department of Computer Engineering and Systems, University of La Laguna, 38206 Tenerife, Spain
This paper is an extended version of our paper published in Álvarez, R.; Santonja, J.; Zamora, A. Algorithms for Lightweight Key Exchange. In Proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2016, San Bartolomé de Tirajana, Spain, 29 November–2 December 2016; Part II 10; Springer International Publishing: Cham, Switzerland, 2016; pp. 536–543.
These authors contributed equally to this work.
These authors contributed equally to this work.
Author to whom correspondence should be addressed.
Received: 20 May 2017 / Revised: 15 June 2017 / Accepted: 23 June 2017 / Published: 27 June 2017
(This article belongs to the Special Issue Selected Papers from UCAmI 2016)
View Full-Text   |   Download PDF [1003 KB, uploaded 28 June 2017]   |  


Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. View Full-Text
Keywords: public-key; key exchange; lightweight cryptography; elliptic curve; security; privacy; sensor networks; internet of things public-key; key exchange; lightweight cryptography; elliptic curve; security; privacy; sensor networks; internet of things

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Alvarez, R.; Caballero-Gil, C.; Santonja, J.; Zamora, A. Algorithms for Lightweight Key Exchange . Sensors 2017, 17, 1517.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top