A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography

Achieving key agreement in wireless sensor networks (WSN) is a very hard problem. Many key agreement schemes come with a shortage of considering sensor addition, revocation, and also rekeying. This paper proposes a key distribution protocol based on the public key cryptography, RSA, and DHECC. The proposed protocol does not trust individual sensors, and partially trust the Gateway. Our protocol establishes pair-wise keys between nodes according to a specific routing algorithm after deployment, instead of loading full pair-wise keys into each node. So each node doesn't have to share a key with all neighbors except those involved in the routing path with it, which is the key role of increasing the resiliency, against node capturing, and also the storage efficiency. The proposed scheme comes to circumvent the shortage of providing the rekeying property of nodes and also nodes addition and revocation, comes with previous algorithms. We evaluate our algorithm from the WSN security view point.

[1]  Chen Hao,et al.  A Key Agreement Scheme Based on Bilinear Pairing for Wireless Sensor Network , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[2]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[3]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Nathan Lewis,et al.  Using trust for key distribution and route selection in Wireless Sensor Networks , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[6]  David J. Malan,et al.  Crypto for Tiny Objects , 2004 .

[7]  Reza Azarderakhsh,et al.  A Key Management Scheme for Cluster Based Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[8]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[9]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[10]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  Muhammad Khurram Khan,et al.  Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.

[13]  Alex Delis,et al.  GPS-Free node localization in mobile wireless sensor networks , 2006, MobiDE '06.

[14]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.

[15]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[16]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[17]  Yanhong Ge,et al.  The Public Key Encryption to Improve the Security on Wireless Sensor Networks , 2009, 2009 Second International Conference on Information and Computing Science.

[18]  Hans Eberle,et al.  Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .

[19]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[21]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[22]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[23]  Dan Boneh,et al.  Fast Variants of RSA , 2007 .

[24]  Alvin S. Lim,et al.  ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.