An Impersonating-Resilient Key Agreement Scheme for Wireless Sensor Networks

Article Preview

Abstract:

In this paper, we proposed an authenticated key agreement scheme, TinyIBAK, based on the identity-based cryptography, for wireless sensor networks. The TinyIBAK scheme provides implicit identity authentication and key confirmation, which effectively prevents unauthenticated access to the sensor network and resists impersonation attacks. We implemented our proposal for TinyOS-2.1 based on the MICAz motes, analyzed the memory occupation, and evaluated the time and energy performance with the Avrora toolkit. Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in wireless sensor networks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

135-140

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, presented at the Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, (2002).

DOI: 10.1145/586110.586117

Google Scholar

[2] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes for sensor networks, presented at the Proceedings of Symposium on Security and Privacy, (2003).

Google Scholar

[3] R. D. Pietro, L. V. Mancini, and A. Mei, Random key-assignment for secure Wireless Sensor Networks, presented at the Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, Fairfax, Virginia, (2003).

DOI: 10.1145/986858.986868

Google Scholar

[4] D. Liu, P. Ning, and R. Li: ACM Transaction on Information System Security vol. 8(2005), pp.41-77, (2005).

Google Scholar

[5] D. J. Malan, M. Welsh, and M. D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, presented at the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks(SECON), Santa Clara, California, USA, (2004).

DOI: 10.1109/sahcn.2004.1381904

Google Scholar

[6] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, TinyPK: securing sensor networks with public key technology, presented at the Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington DC, USA, (2004).

DOI: 10.1145/1029102.1029113

Google Scholar

[7] L. B. Oliveira, D. F. Aranha, C. P. L. Gouvêa, M. Scott, D. F. Câmara, J. López, et al.: Computer Communications vol. 34 (2011), pp.485-493.

Google Scholar

[8] G. Yang and H. Cheng: Chinese Journal of Electronics vol. 36(2008), pp.1389-13958. In Chinese.

Google Scholar

[9] RELIC Cryptographic Toolkit on http: /code. google. com/p /relic-toolkit.

Google Scholar

[10] P. Levis, N. Lee, M. Welsh, and D. Culler, TOSSIM: accurate and scalable simulation of entire TinyOS applications, presented at the Proceedings of the 1st international conference on Embedded networked sensor systems, Los Angeles, California, USA, (2003).

DOI: 10.1145/958491.958506

Google Scholar

[11] Avrora: The AVR Simulation and Analysis Framework on http: /compilers. cs. ucla. edu/ avrora.

Google Scholar

[12] Special Publication 800-57: Recommendation for Key Management on http: /csrc. nist. gov/ CryptoToolkit/ kms/guideline-1-Jan03. pdf.

Google Scholar