DocumentCode :
661780
Title :
Establishing authenticated pairwise key using Pairing-based Cryptography for sensor networks
Author :
Lijun Yang ; Chao Ding ; Meng Wu
Author_Institution :
Coll. of Comput. Sci., Nanjing Univ. of Posts & Telecommun., Nanjing, China
fYear :
2013
fDate :
14-16 Aug. 2013
Firstpage :
517
Lastpage :
522
Abstract :
In this paper, we propose a novel authenticated key agreement scheme using Pairing-based Cryptography, named IBAKA, to address the problems of high memory occupation, low key connectivity and poor resiliency against node capture attacks existed in the traditional key management protocols of large scale sensor networks. Our proposal, which works based on the elliptic curve Diffie-Hellman (ECDH) exchange and identity-based cryptography, can effectively resist man-in-the-middle attacks and node-capture attacks through encrypting the exchanged parameters using identity-based encryption. Theoretical analysis indicates that compare with the typical random key pre-distribution approaches; IBAKA achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying. Furthermore, we implement IBAKA for TinyOS-2.1 based on the MICA2 motes. The experiment results demonstrate that IBAKA is feasible for infrequent key distribution and rekeying in large scale sensor networks.
Keywords :
cryptographic protocols; message authentication; public key cryptography; telecommunication security; wireless sensor networks; IBAKA; MICA2 motes; TinyOS-2.1; authenticated key agreement scheme; authenticated pairwise key; communication overhead; elliptic curve Diffie-Hellman exchange; exchanged parameters; high memory occupation; identity-based cryptography; identity-based encryption; infrequent key distribution; large scale sensor networks; low key connectivity; man-in-the-middle attacks; node capture attacks; node-capture attacks; pairing-based cryptography; random key pre-distribution approaches; secure rekeying; security strength; storage overhead; traditional key management protocols; Elliptic curves; Generators; Public key; Random access memory; Wireless sensor networks; efficient implementation; elliptic curve cryptography; identity-based cryptography; key agreement; security; sensor network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on
Conference_Location :
Guilin
Type :
conf
DOI :
10.1109/ChinaCom.2013.6694650
Filename :
6694650
Link To Document :
بازگشت