Advertisement

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)

Abstract

The concept of forward secrecy is extended to wireless sensor networks where it is frequent that nodes run out of energy and new nodes join the network. However it should not be able to retrieve the previous session key or some crucial information. In 2011 Hagras et al. proposed a key management scheme for heterogeneous wireless sensor networks, which satisfies confidentiality, authentication, integrity and unforgetability but lacks forward secrecy. In this paper, the shortcomings of the victim scheme has been extricated and repaired with the help of Elliptic Curve Discrete logarithm problem (ECDLP). An elliptic curve based signcryption key management scheme has been proposed which includes forward secrecy.

Keywords

Signcryption Key management Forward secrecy Wireless sensor networks 

References

  1. 1.
    Zheng Y (1997) Digital signcryption or how to achieve Cost (Signature & Encryption) cost (Signature)+cost (Encryption). In: Advances in cryptology—CryptoÕ97 LNCS 1294, Springer, pp 165–179Google Scholar
  2. 2.
    Zheng Y (1998) Shortened digital signature, signcryption and compact and unforgetable key agreement schemes. In: IEEE P1363a: standard specifications for public-key cryptography: additional techiqueGoogle Scholar
  3. 3.
    Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227–233MathSciNetCrossRefGoogle Scholar
  4. 4.
    Zheng Y (1998) Signcryption and its application in efficient public key solutions. In: Proceeding of ISW ‘97, LNCS vol 1396, Springer, pp 291–312Google Scholar
  5. 5.
    Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Proceedings of PKCÕ98LNCS 1431, Springer pp 55–59Google Scholar
  6. 6.
    Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Proceedings of 1999 international workshop on practice and theory in public key cryptography (PKCÕ99), 1–3 March 1999, Kamakura, JapanLNCS 1560, Springer, pp 69–81Google Scholar
  7. 7.
    Jung HY, Chang KS, Lee DH, Lim JI (2001) Signcryption schemes with forward secrecy. In: Proceeding of WISA 2, pp 403–475Google Scholar
  8. 8.
    Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. J Appl Math Comput (Elsevier Inc.), 167 (2):870–881. DOI:  10.1016/j.amc.2004.06.124
  9. 9.
    Kim RH, Youm HY (2006) Secure authenticated key exchange protocol based on EC using signcryption scheme. In: Proceeding international conference on hybrid information technology (IEEE Computer society), 8 June 2006Google Scholar
  10. 10.
    Zhou X (2009) Improved signcryption scheme with public verifiability. In: Proceeding Pacific-Asia conference on knowledge engineering and software engineering (IEEE Computer Society), 4 Sept 2009Google Scholar
  11. 11.
    Toorani M, Beheshti AA (2009) An elliptic curve-based signcryption scheme with forward secrecy. J Appl Sci 9(6):1025–1035CrossRefGoogle Scholar
  12. 12.
    Elsayed M, Hasan E (2009) Elliptic curve signcryption with encrypted message authentication and forward secrecy. Int J Comput Sci Netw Sec 9(1)Google Scholar
  13. 13.
    Said EK, Amr IH (2009) New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography. In: Proceedings of the 2009 national conference on radio science. Cairo, EgyptGoogle Scholar
  14. 14.
    Hagras EA, Aly HH, Saied DI (2010) An efficient key management scheme based on elliptic curve signcryption for heterogeneous wireless sensor networks. UCST 1(2):459–474Google Scholar
  15. 15.
    Hagras EA, Aly HH, Saied DI (2011) Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks. In: 28th NRSC’11 April 26–28, 2011, National Telecommunication Institute, EgyptGoogle Scholar
  16. 16.
    Hankerson D, Menezes AJ, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New YorkMATHGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentThapar UniversityPatialaIndia

Personalised recommendations