Browse > Article
http://dx.doi.org/10.4218/etrij.11.0110.0665

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography  

Rajendiran, Kishore (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering)
Sankararajan, Radha (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering)
Palaniappan, Ramasamy (Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering)
Publication Information
ETRI Journal / v.33, no.5, 2011 , pp. 791-801 More about this Journal
Abstract
Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.
Keywords
Key predistribution schemes; security; wireless sensor networks; elliptic curve cryptography;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 2
연도 인용수 순위
  • Reference
1 L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. 9th ACM Conf. Comput. Comm. Security, 2002, pp. 41-47.
2 W. Du et al., "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 42-51.
3 R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Adv. Cryptology: Proc. EUROCRYPT'84, 1985, pp. 335-338.
4 D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. 10th ACM Conf. Comput. Comm. Security, 2003, pp. 52-61.
5 W. Du et al., "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge," Proc. IEEE INFOCOM, 2004, pp. 586-597.
6 A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Proc. Wireless Netw., vol. 8, Sept. 2002, pp. 521-534.   DOI   ScienceOn
7 G. Gaubatz et al., "State of the Art in Ultra-low Power Public Key Cryptography for Wireless Sensor Networks," Proc. Third IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 146-150.
8 A.S. Wander et al., "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. Workshops, PerCom Workshops, 2005, pp. 324-328.
9 X. Li et al., "A Key Distribution Scheme Based on Public Key Cryptography for Wireless Sensor Networks," Proc. Int. Conf. Computational Intelli. Security, ICCIAS, 2006, pp. 1113-1116.
10 G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
11 G. Murphy et al., "Hardware-Software Implementation of Public- Key Cryptography for Wireless Sensor Networks," Proc. Irish Signals Syst. Conf., Dublin, Ireland, 2006, pp. 463-468.
12 M. Pugliese and F. Santucci, "Pair-Wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks Using Vector Algebra," Proc. 5th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 853-859.
13 J. Yao, "A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography," Proc. Int. Conf. Wireless Comm. Networking Mobile Comput., 2009, pp. 1-3.
14 J.W. Jiang and J.H. Liu, "Research on Key Management Scheme for WSN Based on Elliptic Curve Cryptosystem," Proc. 1st Int. Conf. Networked Digital Technol., 2009, pp. 536-540.
15 P. Szczechowiak et al., "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks," Lect. Notes Comput. Sci., vol. 4913, 2008, pp. 305-320.
16 T.H. Shan and C.M. Liu, "Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks," Proc. Asia-Pacific Services Comput. Conf., 2008, pp. 1127-1131.
17 William Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed., New York: Prentice Hall, 2002.
18 N. Gura et al., "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst., Boston, Mass., vol. 3156. Aug. 2004, pp. 925-943.
19 D. Malan, M. Welsh, and M.D. Smith, "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," Proc. 1st IEEE Int. Conf. Commun. Netw., Santa Clara, CA, Oct. 2004.