Abstract
Recent measurements for Public Key Cryptography (PKC) protocols on 8-bit wireless sensor nodes showed optimistic results. It has been shown that Elliptic Curve Cryptography (ECC) is quite applicable to WSN. Still, PKC is much expensive in terms of computation and memory compared by the Symmetric Key Cryptography (SKC). In addition, in PKC, each public key needs to be authenticated before it’s used. We believe that sooner or later, PKC will be widely deployed in WSN. Therefore, we present a cooperative distributed public key authentication scheme that does not require any cryptographic overhead. In our scheme, each node is let to store a few number of hashed keys for other nodes. When a public key authentication is required, nodes who store this key help in authenticating it in a distributed and cooperative way. We consider the constrained resources of the sensor node. Additionally, we extend our scheme to fit with small range of authentication error.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., de Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE SS&P, pp. 197–213 (May 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM CCS 2003, pp. 42–51 (2003)
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: ACM CCS 2002, pp. 41–47 (2002)
Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks. In: ACM CCS 2003, pp. 52–61 (2003)
Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: IEEE SS&P 2005 (May 2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM 2001, pp. 189–199 (2001)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and PK cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)
Gura, N., Patel, A., Wander, A., Eberle, A., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: PerCom 2005, pp. 324–328 (2005)
Watro, R.J., Kong, D., Cuti, S.F., Gardiner, Ch., Lynn, Ch., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: SASN 2004, pp. 59–64 (October 2004)
Malan, D.J., Welsh, A., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on ECC. In: IEEE SECON 2004, pp. 71–80 (2004)
Pietro, R.D., Law, Y.W., Etalle, S., Hartel, P.H., Havinga, P.: State of the Art in Security of Wireless Sensor Networks. IEEE Computer 35(10), 1–10
Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Sixth ACM MobiHoc, pp. 58–67
Koblitz, N., Menezes, A., Vanstone, S.: The State of Elliptic Curve Cryptography. Designs, Codes and Cryptography 19, 173–193 (2000)
BTnode Project - ETH-Zurich, http://www.btnode.ethz.ch/
Crossbow Tech. Inc. Wireless Sensor Networks, http://www.xbow.com/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nyang, D., Mohaisen, A. (2006). Cooperative Public Key Authentication Protocol in Wireless Sensor Network. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_88
Download citation
DOI: https://doi.org/10.1007/11833529_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)