Certificateless based Quantum Cryptosystem for Ad-Hoc UWB-IR

Ad-Hoc UWB-IR technology is being researched and exploited in different fields. Some of its potential applications include Military solutions, emergency search and rescue, collaborative computing, distributed computing, and smart-home applications. Yet, in any of the previously cited domains, Information and network security is a corner stone. Consequently, it becomes mandatory to guarantee the confidentiality, integrity, authenticity and availability of the different assets present in the network through the usage of adequate cryptography protocols and technics. In this paper we discussed the security specifications of the IEEE 802.15.4 standard based Symmetric Key Cryptography (SKC) scheme. Then, we briefly introduced some of the different vulnerabilities and weaknesses present in this scheme. In fact, we arrived to prove that Public Key Cryptography PKC offers better key management and communications security results SKC. We demonstrated that Certificateless (CL-PKC) scheme is the most suitable Asymmetric Key Management protocol for Ad-Hoc UWB-IR networks. Finally, after a very intense and extreme evaluation of different Quantum Public Key Cryptosystem (QPKCS), we concluded that the most optimum one to be used with the CL scheme in order to secure key management and data communications in Ad- Hoc UWB-IR Networks is the Algebraic Eraser (AE) protocol based on braid groups.

[1]  Shrikanth Narayanan,et al.  Collaborative classification applications in sensor networks , 2002, Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002.

[2]  Biming Tian,et al.  Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..

[3]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[4]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[5]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[6]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[7]  Victor C. M. Leung,et al.  Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.

[8]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[9]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[10]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[11]  Chuan-Ming Liu,et al.  Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[12]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[13]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[14]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  Sanjay Jha,et al.  Wireless Sensor Networks for Battlefield Surveillance , 2006 .

[19]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[20]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[21]  Yu Hen Hu,et al.  Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..

[22]  Frédéric Valette,et al.  On the Security of the CCM Encryption Mode and of a Slight Variant , 2008, ACNS.

[23]  Bruno Sinopoli,et al.  Distributed control applications within sensor networks , 2003, Proc. IEEE.

[24]  Tassos Dimitriou,et al.  LIDeA: a distributed lightweight intrusion detection architecture for sensor networks , 2008, SecureComm.

[25]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.