Authentication Based Elliptic Curves Digital Signature for ZigBee Networks

Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem, in particular for internet of things. Compared to the well known cryptosystems such as RSA, ECC offers equivalent security with smaller key sizes. In this paper, we propose an authentication mechanism based on ECDSA (Elliptic curve digital signature algorithm) signature for ZigBee networks. Our system guarantees an end to end authentication between communicating entities. Security analysis and performance evaluations show that our new mechanism is resource efficient and it can resist several kinds of attacks.

[1]  Uttam Ghosh,et al.  Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).

[2]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[3]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[4]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[5]  Paul Tavolato,et al.  Detection of Man-in-the-Middle Attacks on Industrial Control Networks , 2016, 2016 International Conference on Software Security and Assurance (ICSSA).

[6]  Fatema Akhter Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System , 2016 .

[7]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[8]  Najmus Saqib Key exchange protocol for WSN resilient against man in the middle attack , 2016, 2016 IEEE International Conference on Advances in Computer Applications (ICACA).

[9]  Alfred Menezes,et al.  Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift , 2011, IACR Cryptol. ePrint Arch..

[10]  Azizol Abdullah,et al.  AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Song Guo,et al.  Strategic Antieavesdropping Game for Physical Layer Security in Wireless Cooperative Networks , 2017, IEEE Transactions on Vehicular Technology.

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[15]  Radimír Vrba,et al.  On Security of PAN Wireless Systems , 2006, SAMOS.

[16]  Youssif B. Al-Nashif,et al.  Anomaly Behavior Analysis System for ZigBee in smart buildings , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).