On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks

This paper considers the impact of the provision of security for a Java enabled wireless sensor networking platform. In 2007, Sun Microsystems, Inc. released a Java programmable platform; namely Sun Small Programmable Object Technology (Sun SPOT). Given the more intuitive application development environment, it is envisaged that real applications will emerge at a more rapid pace, and as such the importance of the provision of security remains to the fore. The only provision of security, to-date, is that of an industry standard TLS (Transport Layer Security) implementation at the Application Layer; rooted from an ECC (Elliptic Curve Cryptography) based public-key cryptosystem. This work demonstrates that the employment of TLS results in a reduction of 70% of network lifetime; a significant cost to provide security. Given this cost, alternative methods of securing a Sun SPOT based sensor network are considered, culminating in the specification of a cross-layer, hybrid security architecture.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[3]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[5]  Georgios Kambourakis,et al.  Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..

[6]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[7]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[9]  John Daniels,et al.  Java™ on the bare metal of wireless sensor devices: the squawk Java virtual machine , 2006, VEE '06.

[10]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[11]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[12]  Elfed Lewis,et al.  Efficiently securing data on a wireless sensor network , 2007 .

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[15]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[16]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[17]  Carlos F. García-Hernández,et al.  Wireless Sensor Networks and Applications: a Survey , 2007 .

[18]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[19]  Vipul Gupta,et al.  Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper) , 2005, PerCom.

[20]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[21]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[22]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[23]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[24]  Andreas Klein,et al.  Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..