Secure Multihop Key Establishment Protocols for Wireless Sensor Networks
Designing secure communication protocols is not an easy task. Cryptography is often necessary but does not always guarantee the security of protocols as several famous examples attest in the literature. Moreover, in the context of Wireless Sensor Networks (WSNs) the design is even more difficult due to the limited resources of sensor nodes that add extra constraints to take into account. During the life time of a secure WSN, one of the first crucial steps is the key establishment between two nodes. In this paper we propose four secure multihop key establishment protocols based on elliptic curve cryptography (ECC). For each protocol, we make a formal security proof using the automatic tool Scyther. Then, in order to evaluate their performances, we implemented them on testbeds using TelosB motes and TinyOS. Results allow us to estimate the overhead of our key establishment methods.
Keywordsauthentication key establishment wireless sensor network security multihop formal verification
Unable to display preview. Download preview PDF.
- 1.Bala, S., Sharma, G., Verma, A.: Classification of symmetric key management schemes for wireless sensor networks. International Journal of Security and Its Applications 7 (2013)Google Scholar
- 3.Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: INFOCOM, pp. 524–535. IEEE Computer Society (2005)Google Scholar
- 6.Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, SFCS 1981, pp. 350–357 (1981)Google Scholar
- 7.Hussain, M.A., Khan, P., Sup, K.K.: Wsn research activities for military application. In: Proceedings of the 11th International Conference on Advanced Communication Technology, vol. 1, pp. 271–274. IEEE Press (2009)Google Scholar
- 8.Liu, A., Ning, N.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: 7th International Conference on Information Processing in Sensor Networks, pp. 245–256 (April 2008)Google Scholar
- 9.Manica, N., Saloni, M., Toldo, P.: WSN - secure comunications with AES algoritms. University of Trento - Faculty of Computer Science (2008)Google Scholar
- 11.Munivel, E., Ajit, G.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing, pp. 1–6 (2010)Google Scholar
- 12.Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (April 2000)Google Scholar
- 13.Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security protocols for sensor networks. Wireless Networks (2002)Google Scholar
- 14.Certicom Research: Standards for efficient cryptography, sec 1: Elliptic curve cryptography (September 2000)Google Scholar
- 15.Yu, C., Lu, C., Kuo, S.: A simple non-interactive pairwise key establishment scheme in sensor networks. In: IEEE International Conference on Sensing, Communication, and Networking, SECON (2009)Google Scholar
- 16.Zhang, W., Tran, M., Zhu, S., Cao, G.: A random perturbation-based scheme for pairwise key establishment in sensor networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2007)Google Scholar