Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) are becoming an increasingly popular technology for data collection. Since data is of significant importance in the current era, security of the data is essentially indispensable. Because the nodes deployed are usually on an unattended environment, security of the data communicated between the wireless sensor nodes is of utmost importance. A secure established connection between two nodes in a WSN promises a number of preventive measures against different threats but the main issue is to establish the secure connection between any two nodes in a wireless sensor network. With limited resources on a wireless sensor node in mind, this research focuses on establishing Symmetric-Pairwise keys between any two WSN nodes using Public-Key Cryptography (pkc) - which in this case is Elliptic Curve Cryptography.

[1]  Mohamed El-Hadedy,et al.  High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.

[2]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[3]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[4]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[9]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[10]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.