Securing ad hoc embedded wireless networks with public-key cryptography
Feb 24 2006 (10:00 AM), Embedded.com
While the popular image of wireless networking usually features cell phones, PDAs and laptop computers, there are all manner of other devices for which wireless networking presents great advantages. These devices are programmed to do specific tasks or provide specific information, accurately and reliably. They range from managing automated lighting and heating systems in large buildings to monitoring business-critical manufacturing processes or tracking inventory of goods.
These industrial and commercial environments have demanding requirements in terms of network architecture, power consumption, operating cost and, perhaps most importantly, security. Popular wireless networking options may not provide the flexibility required for these applications.
Unlike wireless networks, where multiple devices tend to connect independently to a single hub, ad-hoc wireless networks can change their topology with some frequency. This means that nodes can interconnect to build a mesh architecture in which all nodes in close proximity can communicate.
When each node within the network can communicate with all nearby nodes, the network can quickly and easily route communications to the next available node resulting in impressive robustness, stability and flexibility.
To read the full article, click here
Related Semiconductor IP
- SLVS Transceiver in TSMC 28nm
- 0.9V/2.5V I/O Library in TSMC 55nm
- 1.8V/3.3V Multi-Voltage GPIO in TSMC 28nm
- 1.8V/3.3V I/O Library with 5V ODIO & Analog in TSMC 16nm
- ESD Solutions for Multi-Gigabit SerDes in TSMC 28nm
Related White Papers
- Securing your apps with Public Key Cryptography & Digital Signature
- Securing the IoT: Part 1 - Public key cryptography
- Public key cryptography and security certificates
- Smart Engine for Public Key cryptography
Latest White Papers
- What tamper detection IP brings to SoC designs
- Analyzing Modern NVIDIA GPU cores
- RISC-V in 2025: Progress, Challenges,and What’s Next for Automotive & OpenHardware
- Leveraging RISC-V as a Unified, Heterogeneous Platform for Next-Gen AI Chips
- Design and implementation of a hardened cryptographic coprocessor for a RISC-V 128-bit core