Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Cooperative Public Key Authentication Protocol in Wireless Sensor Network

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

Abstract

Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it’s used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Blundo, C., de Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  3. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE SS&P, pp. 197–213 (May 2003)

    Google Scholar 

  4. Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM CCS 2003, pp. 42–51 (2003)

    Google Scholar 

  5. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: ACM CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  6. Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks. In: ACM CCS 2003, pp. 52–61 (2003)

    Google Scholar 

  7. Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: IEEE SS&P 2005 (May 2005)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM 2001, pp. 189–199 (2001)

    Google Scholar 

  9. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and PK cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  10. Gura, N., Patel, A., Wander, A., Eberle, A., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: PerCom 2005, pp. 324–328 (2005)

    Google Scholar 

  12. Watro, R.J., Kong, D., Cuti, S.F., Gardiner, Ch., Lynn, Ch., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: SASN 2004, pp. 59–64 (October 2004)

    Google Scholar 

  13. Malan, D.J., Welsh, A., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on ECC. In: IEEE SECON 2004, pp. 71–80 (2004)

    Google Scholar 

  14. Pietro, R.D., Law, Y.W., Etalle, S., Hartel, P.H., Havinga, P.: State of the Art in Security of Wireless Sensor Networks. IEEE Computer 35(10), 1–10

    Google Scholar 

  15. Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Sixth ACM MobiHoc, pp. 58–67

    Google Scholar 

  16. Koblitz, N., Menezes, A., Vanstone, S.: The State of Elliptic Curve Cryptography. Designs, Codes and Cryptography 19, 173–193 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  17. BTnode Project - ETH-Zurich, http://www.btnode.ethz.ch/

  18. Crossbow Tech. Inc. Wireless Sensor Networks, http://www.xbow.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nyang, D., Mohaisen, A. (2006). Cooperative Public Key Authentication Protocol in Wireless Sensor Network. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_88

Download citation

  • DOI: https://doi.org/10.1007/11833529_88

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics