Skip to main content

A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks

  • Conference paper
Cryptology and Network Security (CANS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5339))

Included in the following conference series:

Abstract

Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is their main limitation, they require considerable energy to communicate data. The latter is specially dramatic in underwater wireless sensor networks (UWSN), where the acoustic transmission mechanisms are less reliable and more energy-demanding. Saving in communication is thus the primary concern in underwater wireless sensors. With this constraint in mind, we argue that non-interactive identity-based key agreement built on pairings provides the best solution for key distribution in large UWSN when compared to the state of the art. At first glance this claim is surprising, since pairing computation is very demanding. Still, pairing-based non-interactive key establishment requires minimal communication and at the same time enjoys excellent properties when used for key distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257–279 (2005)

    Article  Google Scholar 

  2. Alcaraz, C., Roman, R.: Applying key infrastructures for sensor networks in cip/ciip scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 166–178. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-Based encryption from the Weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blake, I.F., Seroussi, G., Smart, N.: Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol. 317. Cambridge University Press, Cambridge (2005)

    Book  MATH  Google Scholar 

  5. Atmel Corporation. Atmega128 product description (2007), http://www.atmel.com/dyn/products/product_card.asp?part_id=2018

  6. Jun Choi, K., Song, J.-I.: Investigation of feasible cryptographic algorithms for wireless sensor network. In: Proceedings of the 8th International Conference on Advanced Communication Technology, ICACT 2006 (2006)

    Google Scholar 

  7. Cui, J.-H.: Underwatersensor network lab — overview, achievements, plans (2007), http://uwsn.engr.uconn.edu

  8. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical Report TR-05-07, College of William & Mary (March 2005)

    Google Scholar 

  9. Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)

    Article  Google Scholar 

  10. Dupont, R., Enge, A.: Provably secure non-interactive key distribution based on pairings. Discrete Applied Mathematics 154(2), 270–276 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. Großschädl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: ASIACCS, pp. 380–382. ACM, New York (2007)

    Chapter  Google Scholar 

  12. Hickey, H.: Underwater communication: Robofish are the ultimate in ocean robots, keeping in touch without scientists’ help (June 2008)

    Google Scholar 

  13. LinkQuest Inc. Underwater acoustic modems (2007), http://www.link-quest.com/

  14. Crossbow Technology Inc. Wireless sensor nodes (2008), http://www.xbow.com/

  15. Kohl, J.T., Neuman, B.C.: The Kerberos network authentication service (V5) (1993)

    Google Scholar 

  16. Charles Lai, B., Hwang, D.D., Pete Kim, S., Verbauwhede, I.: Reducing radio energy consumption of key management protocols for wireless sensor networks. In: Proceedings of the ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED 2004), pp. 351–356 (2004)

    Google Scholar 

  17. Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Des. Codes Cryptography 28(2), 119–134 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  18. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  19. Liu, L., Zhou, S., Cui, J.-H.: Prospects and problems of wireless communications for underwater sensor networks. Wireless Communications and Mobile Computing - Special Issue on Underwater Sensor Networks (to appear, 2008)

    Google Scholar 

  20. Mehta, M., Huang, D., Harn, L.: Rink-rkp: A scheme for key predistribution and shared-key discovery in sensor networks. In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), pp. 193–197 (2005)

    Google Scholar 

  21. Menezes, A., Qu, M., Vanstone, S.: Some new key agreement protocols providing mutual implicit authentication. In: SecondWorkshop on Selected Areas in Cryptography (SAC 1995) (1995)

    Google Scholar 

  22. Oliveira, L.B., Scott, M., Lopez, J., Dahab, R.: Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems (to appear, 2008), http://eprint.iacr.org/2007/482

  23. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  24. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing over elliptic curve (in japanese). In: The 2001 Symposium on Cryptography and Information Security, Oiso, Japan (2001)

    Google Scholar 

  25. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  26. Verheul, E.R.: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems. J. Cryptology 17(4), 277–296 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  27. Accredited Standards Committee X9. American national standard x9.62-2005, public key cryptography for the financial services industry, the elliptic curve digital signature algorithm (ecdsa) (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Galindo, D., Roman, R., Lopez, J. (2008). A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds) Cryptology and Network Security. CANS 2008. Lecture Notes in Computer Science, vol 5339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89641-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89641-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89640-1

  • Online ISBN: 978-3-540-89641-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics