TinyAKE: A More Practicable and Trustable Scheme for Authenticated Key Establishment in WSNs

The characteristics of high loss rate, resource constraint, being eager for good security haven’t been fully considered in the existing key establishment protocols of wireless sensor networks. Analyzing the key establishing problem from the MAC and physical layers, existing protocols are not practicable enough due to their overlong agreement packets and single round key establishment. To mitigate the impact of these problems, a group of design principles for secure sensor networks has been presented and TinyAKE, an authenticated key transport protocol based on lightweight certificate, is proposed in this paper. The security of TinyAKE are proved with the theory of indistinguishability, meanwhile, the correctness is also proved, the performance is analyzed and compared with the existing similar protocols. Finally TinyAKE is implemented in the TinyOS with TinyECC. Our evaluation shows that TinyAKE is a more practicable and trustable authenticated key establishment protocol than existing protocols. The experimental result shows that the key transport with certificate mechanism is feasible in WSNs. Moreover, the simulation results show that the optimal number of repeated negotiation is one when the secure connectivity rate of TinyAKE is improved by using the repeated key negotiation.

[1]  Bo Sheng,et al.  Public-key based access control in sensornet , 2011, Wirel. Networks.

[2]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[3]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Kyung-Ah Shim,et al.  A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.

[5]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[6]  Jun Zhao,et al.  On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Giuseppe Piro,et al.  Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption , 2017, IEEE Embedded Systems Letters.

[8]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[9]  Leili Farzinvash,et al.  Two-phase node deployment for target coverage in rechargeable WSNs using genetic algorithm and integer linear programming , 2020 .

[10]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[11]  Majid Bayat,et al.  LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT , 2021, Wirel. Networks.

[12]  Anfeng Liu,et al.  Data Collection in Underwater Sensor Networks based on Mobile Edge Computing , 2019, IEEE Access.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[15]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[16]  Jie Huang,et al.  An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter , 2014, Sensors.

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Ibrahim Nadir,et al.  Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN) , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[19]  David E. Culler,et al.  The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.

[20]  Hassan M. Elkamchouchi,et al.  An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).

[21]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[22]  Jing He,et al.  A Survey on Public Key Mechanism in Wireless Sensor Networks , 2020 .

[23]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[24]  Fagen Li,et al.  AKAIoTs: authenticated key agreement for Internet of Things , 2019, Wirel. Networks.

[25]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[26]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[27]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[28]  Ki-Hyung Kim,et al.  A Reliable and Secure Hybrid Key Management Scheme for WSNs , 2015 .

[29]  Hairong Qi,et al.  A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[30]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[31]  Radha Poovendran,et al.  Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.

[32]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[33]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[34]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.

[35]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[36]  Anfeng Liu,et al.  A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues , 2019, Ad Hoc Sens. Wirel. Networks.

[37]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.