Public Key Authentication using(t, n) Threshold Scheme for WSN

(t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증

  • Published : 2008.10.31

Abstract

Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

Keywords

References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless Sensor Networks : A Survey", Computer Networks 38(4), pp. 393-422, 2002 https://doi.org/10.1016/S1389-1286(01)00302-4
  2. G. Gaubatz, J. Kaps and B. Sunar, "Public Keys Cryptography in Sensor Networks - Revisited", In The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks(ESAS), 2004
  3. L. Zhou and Z. J. Haas, "Securing Ad Hoc Network", IEEE Network, 13(6) : pp. 24-30, Nov/Dec 1999
  4. Srdjan Capkun, Levente Buttyan and Jean- Pierre Hubaux, "Small Worlds in Security Systems : An Analysis of the PGP Certificate Graph", In Proceedings of the ACM New Security Paradigms Workshop 2002, p. 2, 2002
  5. Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong, "Talking To Stranger : Authentication in Ad-Hoc Wireless Networks", In Proceedings of the Network and Distributed System Security Symposium 2002, 2002
  6. R. Merkle, "Protocols for Public Key Cryptosystems", In Proceedings of the IEEE Symposium on Research in Security and Privacy, Apr 1980
  7. Wenliang Du, Ronghua Wang and Peng Ning, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks", 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc), 2005
  8. Y. Desmedt and Y. Frankel, "Threshold Cryptosystems", In Advances in Cryptology - Crypto '89, Proceedings, Lecture Notes in Computer Science 435, G. Brassard, Ed., Santa Barbara : Springer-Verlag, pp. 307-315, 1990
  9. Y. Desmedt. "Society and Group Oriented Cryptography : A New Concept", In C. Pomerance, Editor, Advances in Cryptology, Proc. of Crypto '87(Lecture Notes in Computer Science 293), pp. 120-127, Springer-Verlag, Santa Barbara, California, U.S.A., August 16-20, 1988
  10. G. R. Blakley, "Safeguarding Cryptographic Keys", In Proc. Nat. Computer Conf. AFIPS Conf, Proc., pp. 313-317, Vol. 48, 1979
  11. A. Shamir, "How to Share a Secret", Commun. ACM, 22 : pp. 612-613, November 1979
  12. T. El Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Trans. Inform. Theory, 31 : pp. 469-472, 1985 https://doi.org/10.1109/TIT.1985.1057074
  13. W. Diffie and M. E. Hellman, "New Directions in Cryptography", IEEE Trans. Inform. Theory, IT-22(6) : pp. 644-654, November 1976