An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks

Path-key establishment has become accepted as a commonly used solution in wireless sensor networks (WSNs) for protecting node-to-node communications from malicious attacks. Unfortunately, traditional security approaches are not well suited to WSNs due to their limited computational/communication abilities and memory, and their vulnerable-to-attack structure. Moreover, to extend lifetime and usability of sensor networks, power conservation and scalability are required in the design of sensor network schemes. In this paper, we propose an efficient sensor-to-sensor authenticated path-key establishment (ES2S-APKE) scheme for wireless sensor networks. ES2S-APKE accomplishes node authentication and pairwise key establishment by applying well-known Elliptic Curve Cryptography (ECC) and using cluster-based sensor groups. In clustered sensor networks, a back-end system creates a view of the credential authority (CA) and provides credential update service for all involved nodes in the network, including sink nodes and sensor nodes. A ticket scheme is introduced to provide efficient S2S path-key establishment service. Finally, the security and performance of our proposed ES2S-APKE is compared with Lee’s [19] and Varadharajan’s [32] schemes.

[1]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[6]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[7]  Ronald Cramer,et al.  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.

[8]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[9]  Qian Tian,et al.  A NEW METHOD OF NOISE REMOVAL FOR BODY VIBRATION SIGNALS IN WIRELESS SENSOR NETWORKS , 2006 .

[10]  Neng-Chung Wang,et al.  A hierarchical key management scheme for secure group communications in mobile ad hoc networks , 2007, J. Syst. Softw..

[11]  Yuguang Fang,et al.  Access control in wireless sensor networks , 2007, Ad Hoc Networks.

[12]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[13]  Min-Shiang Hwang,et al.  Threshold Signatures: Current Status and Key Issues , 2005, Int. J. Netw. Secur..

[14]  Minoru Ito,et al.  Localization of a Moving Sensor by Particle Filters , 2007 .

[15]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[16]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Xuemin Shen,et al.  Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.

[19]  Mohamed Eltoweissy,et al.  Key management for long-lived sensor networks in hostile environments , 2007, Comput. Commun..

[20]  Yau-Hwang Kuo,et al.  eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks , 2007, Comput. Networks.

[21]  Falko Dressler Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..

[22]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[23]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[24]  Fei Hu,et al.  Scalable Security in Wireless Sensor and Actuator Networks ( WSANs ) , 2005 .

[25]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[26]  Hiroshi Mineno,et al.  An Energy-Aware Routing Scheme with Node Relay Willingness in Wireless Sensor Networks , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[27]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[28]  Jang-Ping Sheu,et al.  Pair-wise path key establishment in wireless sensor networks , 2007, Comput. Commun..

[29]  Issa M. Khalil,et al.  Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks , 2007, Ad Hoc Networks.

[30]  Chris McDonald,et al.  Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks , 2006, Int. J. Netw. Secur..

[31]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[32]  Cheng-Chi Lee,et al.  Password Authentication Schemes: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[33]  H. Thompson,et al.  FAULT CLASSIFICATION BASED UPON SELF ORGANIZING FEATURE MAPS AND DYNAMIC PRINCIPAL COMPONENT ANALYSIS FOR INERTIAL SENSOR DRIFT , 2007 .

[34]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .