Advertisement

Secure Multihop Key Establishment Protocols for Wireless Sensor Networks

  • Ismail Mansour
  • Gérard Chalhoub
  • Pascal Lafourcade
Part of the Communications in Computer and Information Science book series (CCIS, volume 448)

Abstract

Designing secure communication protocols is not an easy task. Cryptography is often necessary but does not always guarantee the security of protocols as several famous examples attest in the literature. Moreover, in the context of Wireless Sensor Networks (WSNs) the design is even more difficult due to the limited resources of sensor nodes that add extra constraints to take into account. During the life time of a secure WSN, one of the first crucial steps is the key establishment between two nodes. In this paper we propose four secure multihop key establishment protocols based on elliptic curve cryptography (ECC). For each protocol, we make a formal security proof using the automatic tool Scyther. Then, in order to evaluate their performances, we implemented them on testbeds using TelosB motes and TinyOS. Results allow us to estimate the overhead of our key establishment methods.

Keywords

authentication key establishment wireless sensor network security multihop formal verification 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bala, S., Sharma, G., Verma, A.: Classification of symmetric key management schemes for wireless sensor networks. International Journal of Security and Its Applications 7 (2013)Google Scholar
  2. 2.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: INFOCOM, pp. 524–535. IEEE Computer Society (2005)Google Scholar
  4. 4.
    Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)CrossRefzbMATHMathSciNetGoogle Scholar
  6. 6.
    Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, SFCS 1981, pp. 350–357 (1981)Google Scholar
  7. 7.
    Hussain, M.A., Khan, P., Sup, K.K.: Wsn research activities for military application. In: Proceedings of the 11th International Conference on Advanced Communication Technology, vol. 1, pp. 271–274. IEEE Press (2009)Google Scholar
  8. 8.
    Liu, A., Ning, N.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: 7th International Conference on Information Processing in Sensor Networks, pp. 245–256 (April 2008)Google Scholar
  9. 9.
    Manica, N., Saloni, M., Toldo, P.: WSN - secure comunications with AES algoritms. University of Trento - Faculty of Computer Science (2008)Google Scholar
  10. 10.
    Mansour, I., Rusinek, D., Chalhoub, G., Lafourcade, P., Ksiezopolski, B.: Multihop node authentication mechanisms for wireless sensor networks. In: Guo, S., Lloret, J., Manzoni, P., Ruehrup, S. (eds.) ADHOC-NOW 2014. LNCS, vol. 8487, pp. 402–418. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  11. 11.
    Munivel, E., Ajit, G.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing, pp. 1–6 (2010)Google Scholar
  12. 12.
    Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (April 2000)Google Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security protocols for sensor networks. Wireless Networks (2002)Google Scholar
  14. 14.
    Certicom Research: Standards for efficient cryptography, sec 1: Elliptic curve cryptography (September 2000)Google Scholar
  15. 15.
    Yu, C., Lu, C., Kuo, S.: A simple non-interactive pairwise key establishment scheme in sensor networks. In: IEEE International Conference on Sensing, Communication, and Networking, SECON (2009)Google Scholar
  16. 16.
    Zhang, W., Tran, M., Zhu, S., Cao, G.: A random perturbation-based scheme for pairwise key establishment in sensor networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Ismail Mansour
    • 1
  • Gérard Chalhoub
    • 1
  • Pascal Lafourcade
    • 1
  1. 1.LIMOSClermont UniversityAubièreFrance

Personalised recommendations