Feasibility of position-based multivariate cryptosystems for WSN

In this research paper, the positions of sensor nodes are used for generating their public keys. In a wireless sensor networks (WSN), the nodes observe the environment in their vicinity and send the position specific data to the sink. Since the position and sensed data of a sensor are linked up to each other, the sensor position can be used as its unique public key. Multivariate cryptography offers a lightweight alternative to public key cryptography for sensor networks and position as public key can enhance its viability for WSN. In this study, we proposed a position-based multivariate cryptosystem for WSN that verifies the position of the sensor node and also prevented from the collusion attack. The performance and security analysis of the proposed scheme demonstrates that reduce storage overhead, communication overhead and prevent collusion attack in various contexts are possible within lightweight computational constraints.

[1]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[2]  Sidi Mohamed El Yousfi Alaoui,et al.  A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem , 2010, Selected Areas in Cryptography.

[3]  Jintai Ding,et al.  Square-Vinegar Signature Scheme , 2008, PQCrypto.

[4]  Deepa Kundur,et al.  Security-aware routing and localization for a directional mission critical network , 2010, IEEE Journal on Selected Areas in Communications.

[5]  Alessandro Nordio,et al.  Field Reconstruction in Sensor Networks With Coverage Holes and Packet Losses , 2011, IEEE Transactions on Signal Processing.

[6]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[7]  A. Stelzer,et al.  Position estimation techniques for the local position measurement system LPM , 2006, 2006 Asia-Pacific Microwave Conference.

[8]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  S Lanzisera,et al.  Radio Frequency Time-of-Flight Distance Measurement for Low-Cost Wireless Sensor Localization , 2011, IEEE Sensors Journal.

[11]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[12]  M. Vossiek,et al.  Precise Distance and Velocity Measurement for Real Time Locating in Multipath Environments Using a Frequency-Modulated Continuous-Wave Secondary Radar Approach , 2008, IEEE Transactions on Microwave Theory and Techniques.

[13]  M.R. Mahfouz,et al.  Investigation of High-Accuracy Indoor 3-D Positioning Using UWB Technology , 2008, IEEE Transactions on Microwave Theory and Techniques.

[14]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[16]  Jacques Stern,et al.  Practical Cryptanalysis of SFLASH , 2007, CRYPTO.

[17]  Jintai Ding,et al.  Algebraic Attack on HFE Revisited , 2008, ISC.

[18]  Rafail Ostrovsky,et al.  Position Based Cryptography , 2009, CRYPTO.

[19]  Chen-Mou Cheng,et al.  Could SFLASH be Repaired? , 2008, ICALP.

[20]  Sarvesh Bhardwaj,et al.  Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.

[21]  Faramarz Fekri,et al.  Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.

[22]  Bo-Yin Yang,et al.  l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography , 2007, Public Key Cryptography.

[23]  Jacques Stern,et al.  Designing Identification Schemes with Keys of Short Size , 1994, CRYPTO.

[24]  Daojing He,et al.  Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[25]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[26]  Anthony J. Peyton,et al.  A Three-Dimensional Positioning Algorithm for Networked Wireless Sensors , 2011, IEEE Transactions on Instrumentation and Measurement.

[27]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[28]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[29]  Ludovic Perret,et al.  Cryptanalysis of MinRank , 2008, CRYPTO.

[30]  Kiseon Kim,et al.  Distance Estimation With Weighted Least Squares for Mobile Beacon-Based Localization in Wireless Sensor Networks , 2010, IEEE Signal Processing Letters.

[31]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[32]  Jintai Ding,et al.  Secure Electronic Voting , 2006, Advances in Information Security.

[33]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[34]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[35]  Kiseon Kim,et al.  Mobile Beacon-Based 3D-Localization with Multidimensional Scaling in Large Sensor Networks , 2010, IEEE Communications Letters.

[36]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[37]  Jintai Ding,et al.  A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.

[38]  Feipei Lai,et al.  A "Medium-Field" Multivariate Public-Key Encryption Scheme , 2006, CT-RSA.

[39]  Jacques Stern,et al.  Cryptanalysis of SFLASH with Slightly Modified Parameters , 2007, EUROCRYPT.

[40]  Yu Zhang,et al.  Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.

[41]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[42]  David Evans,et al.  Localization for mobile sensor networks , 2004, MobiCom '04.

[43]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[44]  Zhi Ding,et al.  Source Localization in Wireless Sensor Networks From Signal Time-of-Arrival Measurements , 2011, IEEE Transactions on Signal Processing.

[45]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[46]  Chunming Qiao,et al.  Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes , 2010, IEEE Transactions on Mobile Computing.

[47]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[48]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[49]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[50]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[51]  Jacques Stern,et al.  Cryptanalysis of HFE with Internal Perturbation , 2007, Public Key Cryptography.

[52]  Bart Preneel,et al.  On the security of stepwise triangular systems , 2006, Des. Codes Cryptogr..

[53]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[54]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[55]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..