Light Weight Secure Key Generation Protocol with Hidden Generator Point using ECC
DOI:
https://doi.org/10.14738/tnc.34.1295Keywords:
Key establishment, Hidden generator, Node Identification, Authentication, WSN, ECCAbstract
Key generation and distribution is one of the most important primitive of any security framework. This is irrespective of using a symmetric or asymmetric cryptosystem. However, while securing a WSN, its resource constraint nature cannot be ignored. Therefore Elliptical Curve Cryptography (ECC) based solutions like Elliptical Curve Digital Signature algorithm (ECDSA), Elliptical Curve Diffie-Hellman (ECDH) are becoming more and more popular in comparison to other Public crypto system like RSA. In ECC, the Generator point is treated as a public parameter along with other domain parameters. This can make communication within the WSN vulnerable to man-in-the-middle attack. The attack can be thwarted by keeping the Generator point Private and still be able to establish a common Generator Point across communication parties .It will result in establishing a light weight secure key between a sender and a receiver and achieve other security primitives like generation of MAC and Node identification. This paper discusses and analyses the generation of Shared keys using 1 hidden generator point in comparison to 2- hidden point generator and the conventional ECDH method.
References
(1) Adrian Perrig, John Stankovic, David Wagner.,” Security in wireless sensor networks”, Communications of the ACM, vol 47,no. 6, pp 53-57, June 2004.
(2) Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen and David E.Culler., “SPINS: Security protocol for sensor networks”, in proceedings of 7th International conference on mobile networking and computing, 2001, vol 8, no.5, pp 189-199, 2001.
(3) Xiaojiang Du, Hsiao-Hwa chen. , “Security in Wireless Sensor Networks”, IEEE Wireless Communications, August 2008.
(4) N.Gura, A.Patel, A. Wander, H.Eberele and S. Shantz.,” Comparing Elliptic Curve Cryptography and RSA on 8 bit CPU”.,in 2004 workshop on cryptographic hardware and embedded systems, August 2004.
(5) Zhu, S.,Setia,S., and Jajochia, S., “LEAP: Energy efficient security mechanism for large-scale distributed sensor networks”, In the proceedings of the conference on computer and communications security
,03,ACM Press, Washigton DC 2003, pp 62-72.
(6) Escheanauer, L., and Gilgor, U.D., “A Key management scheme for distributed sensor networks.”, in the proceedings of the conference on computer and communications security “02”, Washington DC 2002 pp 41-47.
(7) Chan, H,Perrig, A., and Song,D,” Predistribution schemes for sensor networks”, in the proceedings of IEEE security and privacy symposium ,IEEE Computer society press, Loss Alanos 2003, pp 197-213.
(8) R. Watro, D. Kong, S.Cuti, C.Gardiner, C.Lynn and P. Kruus., ” TinyPK: Securing sensor networks with public key technology.” , in the proceedings of 2nd ACM workshop on security of adhoc sensor networks (SASN 04), pp 59-64, New York, ACM press.
(9) Q.Huang, J.Cukier, H.Kobayashi, B.Liu and J.Zhang., ” Fast authenticated key establishment protocols for self-organizing sensor networks”, in the proceedings of the 2nd ACM international conference on WSN and applications , pp 141-150,ACM Press, 2003.
(10) ZHAO Xin, EANG Xia-dong., “Design and implementation of the Hybrid broadcast authentication protocols in WSN”, published in 2nd international conference on future generation communication and networking, 2008.
(11) Xu Huang, et al. “Fast Scalar multiplication for Elliptic curve cryptography in Sensor Networks with Hidden Generator point”, 2010 International conference on Cyber-enabled distributed Computed and knowledge Discovery.
(12) Ravi Kishore et al. “High Performance Scalar Multiplication for ECC. In 2013 International Conference on Computed Communication and Informatics (ICCCI-2013, Jan 04-06, 2013 Coimbatore, INDIA)
(13) Ravi Kishore Kodali et al. “Implementation of ECC with Hidden Generator Point in Wireless Sensor Network”. 978-1-4799-3635-9/14 @ 2014 IEEE.
(14) D. Hankerson et al. “Guide to Elliptic Curve Cryptography” Springer, 2004
(15) Bernard Menzes “Network Security and Cryptography”, Cengage Learning
(16) Ioannis Chatzigiannakis et al. “Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constraint Devices”. Ict-2010-258885(SPITFIRE)
(17) Yi Jiang et al. “Cluster Based Strategies for Public Key Authentication in Wireless Sensor Networks”. Chinese journal of Sensors and Actuators, Volume 20,6,2007.
(18) www.certicom.com
(19) TinyOS. http:// www.tinyos.net
(20) P. Levis, N. Lee, M. Welsh and D. E. Culler. et al TOSSIM : “Accurate and Stable Simulation of Entire TinyOS Applications”. SenSys 2003
(21) A. Liu and P. Ning et al. Tiny ECC: “A Configurable Library for Elliptical Curve Cryptography in Wireless Sensor Networks” IPSN 2008