Efficacy of multivariate cryptosystems for DWSN

Dynamic wireless sensor networks (DWSN) is a network of thousands tiny sensor devices deployed in a hostile environment. This network is mainly used for large scale environment monitoring. Security is vital for such networks. However, traditional cryptographic algorithms are resource intensive. They need large computation and require large memory and bandwidth. To address the problems of security in resource limited DWSN, different types of multivariate cryptosystems are proposed. The viability of multivariate cryptosystems for DWSN are examined. Results have indicated that the multivariate cryptosystems are attractive for DWSN. In this paper, efficacy of different multivariate cryptosystems for DWSN has been evaluated. In contrast to other multivariate cryptosystems schemes, rainbow multivariate scheme requires low computational power and reduced storage overheads. Simulation results also show that rainbow multivariate scheme can maximize throughput to achieve short latency for a particular interval of time.

[1]  Louis Goubin,et al.  FLASH, a Fast Multivariate Signature Algorithm , 2001, CT-RSA.

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Jintai Ding,et al.  A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation , 2004, Public Key Cryptography.

[4]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[5]  Jacques Stern,et al.  An Efficient Provable Distinguisher for HFE , 2006, ICALP.

[6]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[7]  Wei-hong Wang,et al.  Design and implementation of an ECDSA-based identity authentication protocol on WSN , 2009, 2009 3rd IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.

[8]  Andrey Bogdanov,et al.  Fast Multivariate Signature Generation in Hardware: The Case of Rainbow , 2008, 2008 16th International Symposium on Field-Programmable Custom Computing Machines.

[9]  Jintai Ding,et al.  Algebraic Attack on HFE Revisited , 2008, ISC.

[10]  Jintai Ding,et al.  Secure Electronic Voting , 2006, Advances in Information Security.

[11]  Louis Goubin,et al.  QUARTZ, 128-Bit Long Digital Signatures , 2001, CT-RSA.

[12]  Faramarz Fekri,et al.  Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.

[13]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.