Securing Underwater Communications: Key Agreement based on Fully Hashed MQV

This paper concerns the implementation and testing of a protocol that two honest parties can efficiently use to share a common secret session key. The protocol, based on the Fully Hashed Menezes-Qu-Vanstone (FHMQV) key agreement, is optimized to be used in underwater acoustic communications, thus enabling secure underwater acoustic networking. Our optimization is geared towards obtaining secure communications without affecting network performance by jointly keeping security-related overhead and energy consumption at bay. Implementation and testing experiments have been performed with the SUNSET SDCS framework and its SecFUN extension using as hardware two submerged acoustic modems. Results show that our approach imposes a low computational burden to the underwater node, which implies low local energy consumption. This is due to the fact the FHMQV protocol is highly efficient resulting in a small number of operations with a low computation cost. In addition the use of elliptic curves allows to further reduce the computational overhead.

[1]  Gregory R. Andrews,et al.  Effïcient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks , 2009 .

[2]  Rodrigo Roman,et al.  On the energy cost of authenticated key agreement in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[3]  Philippe Elbaz-Vincent,et al.  On the Security of the (F)HMQV Protocol , 2016, AFRICACRYPT.

[4]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[5]  Mauro Conti,et al.  Secure underwater acoustic networks: Current and future research directions , 2016, 2016 IEEE Third Underwater Communications and Networking Conference (UComms).

[6]  Morris J. Dworkin,et al.  SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .

[7]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[8]  Cas J. F. Cremers,et al.  Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal , 2012, ESORICS.

[9]  Hassan M. Elkamchouchi,et al.  An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).

[10]  Ítalo S. Cunha,et al.  End-to-end authentication in Under-Water Sensor Networks , 2013, 2013 IEEE Symposium on Computers and Communications (ISCC).

[11]  Alfred Menezes,et al.  An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..

[12]  Chiara Petrioli,et al.  Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[13]  Chiara Petrioli,et al.  R-CARP: A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks , 2015, WUWNet.

[14]  Hugo Krawczyk,et al.  HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.

[15]  John R. Potter,et al.  The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks , 2015, Ad Hoc Networks.

[16]  Alessandro Casavola,et al.  SeaModem: A low-cost underwater acoustic modem for shallow water communication , 2015, OCEANS 2015 - Genova.

[17]  Chiara Petrioli,et al.  SecFUN: Security framework for underwater acoustic sensor networks , 2015, OCEANS 2015 - Genova.

[18]  Jean-Claude Bajard,et al.  A Secure and Efficient Authenticated Diffie-Hellman Protocol , 2009, EuroPKI.

[19]  Wei Zhou,et al.  Security in Underwater Sensor Network , 2010, 2010 International Conference on Communications and Mobile Computing.