DOI QR코드

DOI QR Code

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering) ;
  • Sankararajan, Radha (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering) ;
  • Palaniappan, Ramasamy (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering)
  • Received : 2010.11.08
  • Accepted : 2011.05.06
  • Published : 2011.10.31

Abstract

Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Keywords

References

  1. L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. 9th ACM Conf. Comput. Comm. Security, 2002, pp. 41-47.
  2. W. Du et al., "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 42-51.
  3. R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Adv. Cryptology: Proc. EUROCRYPT'84, 1985, pp. 335-338.
  4. D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 52-61.
  5. W. Du et al., "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM, 2004, pp. 586-597.
  6. A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Proc. Wireless Netw., vol. 8, Sept. 2002, pp. 521-534. https://doi.org/10.1023/A:1016598314198
  7. G. Gaubatz et al., "State of the Art in Ultra-low Power Public Key Cryptography for Wireless Sensor Networks," Proc. Third IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 146-150.
  8. A.S. Wander et al., "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 324-328.
  9. X. Li et al., "A Key Distribution Scheme Based on Public Key Cryptography for Wireless Sensor Networks," Proc. Int. Conf. Computational Intelli. Security, ICCIAS, 2006, pp. 1113-1116.
  10. G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
  11. G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
  12. M. Pugliese and F. Santucci, "Pair-Wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks Using Vector Algebra," Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 853-859.
  13. J. Yao, "A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography," Proc. Int. Conf. Wireless Comm. Networking Mobile Comput., 2009, pp. 1-3.
  14. J.W. Jiang and J.H. Liu, "Research on Key Management Scheme for WSN Based on Elliptic Curve Cryptosystem," Proc. 1st Int. Conf. Networked Digital Technol., 2009, pp. 536-540.
  15. P. Szczechowiak et al., "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks," Lect. Notes Comput. Sci., vol. 4913, 2008, pp. 305-320.
  16. T.H. Shan and C.M. Liu, "Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks," Proc. Asia-Pacific Services Comput. Conf., 2008, pp. 1127-1131.
  17. N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst., Boston, Mass., vol. 3156. Aug. 2004, pp. 925-943.
  18. D. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. 1st IEEE Int. Conf. Commun. Netw., Santa Clara, CA, Oct. 2004.
  19. William Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed., New York: Prentice Hall, 2002.

Cited by

  1. Flight Protection Data via Dynamic Sensor Networks vol.10, pp.2, 2011, https://doi.org/10.1155/2014/509313
  2. An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks vol.11, pp.9, 2011, https://doi.org/10.1155/2015/691498
  3. Efficient Group Key Management for Non-reliable Link Networks vol.98, pp.2, 2011, https://doi.org/10.1007/s11277-017-4956-y
  4. Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices vol.40, pp.3, 2018, https://doi.org/10.4218/etrij.2017-0220
  5. Group Key Management Scheme for Multicast Communication Fog Computing Networks vol.8, pp.10, 2011, https://doi.org/10.3390/pr8101300