Browse > Article
http://dx.doi.org/10.3745/KTSDE.2013.2.11.747

An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks  

Kim, Hyojin (중앙대학교 전자전기공학부)
Park, Ho-Hyun (LG전자)
Publication Information
KIPS Transactions on Software and Data Engineering / v.2, no.11, 2013 , pp. 747-756 More about this Journal
Abstract
It is important to reduce unnecessary overhead in sensor network using battery. In addition encryption is important because of necessity of security. Since unavoidable overhead occurs in case of encryption, security and overhead are in trade-off condition. In this paper, we use a concept called trust to reduce the encryption overhead. We reduce overhead by controlling encryption key sizes while maintaining the security level where high and low trust nodes are mixed. We simulated and compared normal encryption and trust value based encryption. As a result, the latter has lower execution time and overhead. If we define a standard of trust levels considering purpose and circumstances of real network, we can use constrained resources efficiently in sensor network.
Keywords
Trust; Elliptic Curve; RBAC; Sensor Network; RC6;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. Zhang, Y. Mu, W. Susilo, "Reducing Security Overhead for Mobile Networks", AINA'05, IEEE, 2005.
2 W. Liu, R. Luo, H, Yang, "Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks", CMC'09, IEEE, 2009.
3 S.C. Kim, W.J. Lee, P.J. Jung, " A Study on the Reliability Type and the Reliability Improvement in Ubiquitous Sensor Networks", Summer Conference, Vol.31, No.1, The institute of electronics engineers of Korea, 2008.
4 A. Josang, "An Algebra for Assessing Trust in Certification Chains" Network and Distributed Systems Security, 1999.
5 R.S. Sandhu, E.J. Coynek, H.L. Feinsteink, C.E. Youmank, "Role-Based Access Control Models", IEEE Computer, Vol.29, No.2, pp.38-47, 1996.
6 ITI Secretariat, "Standard for Role-Based Access Control", ANSI BSR INCITS 359, 2004.
7 C.H. Lim, D.H. Lee, "Elliptic curve crypto algorithm", TTA journal Vol.80, pp.98-104, 2002.
8 D. Johnson, A. Menezes, S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)", International Journal of Information Security, Vol.1, Issue 1, pp.36-63, 2001.   DOI   ScienceOn
9 E. Rescorla, "Diffie-Hellman Key Agreement Method, RFC 2631", IETF Network Working Group, 1999.
10 M.Y. Malik, "Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor", ICACT, 2010
11 R.L. Rivest, "The RC5 Encryption Algorithm", MIT Laboratory for Computer Science, 1997.
12 R.L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L.Yin, "The RC6 TM Block Cipher", MIT Laboratory for Computer Science, 1998.
13 M. Ragab, A. Ismail. S. Farag Allah, "Enhancements and Implementation of RC6 Block Cipher for Data Security", IEEE Region 10 International Conference on Electrical and Electronic Technology, 2001.
14 Certicom research, "SEC 2: Recommended Elliptic Curve Domain Parameters", Certicom Corp, 2000.