Abstract
Designing secure communication protocols is not an easy task. Cryptography is often necessary but does not always guarantee the security of protocols as several famous examples attest in the literature. Moreover, in the context of Wireless Sensor Networks (WSNs) the design is even more difficult due to the limited resources of sensor nodes that add extra constraints to take into account. During the life time of a secure WSN, one of the first crucial steps is the key establishment between two nodes. In this paper we propose four secure multihop key establishment protocols based on elliptic curve cryptography (ECC). For each protocol, we make a formal security proof using the automatic tool Scyther. Then, in order to evaluate their performances, we implemented them on testbeds using TelosB motes and TinyOS. Results allow us to estimate the overhead of our key establishment methods.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Bala, S., Sharma, G., Verma, A.: Classification of symmetric key management schemes for wireless sensor networks. International Journal of Security and Its Applications 7 (2013)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: INFOCOM, pp. 524–535. IEEE Computer Society (2005)
Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, SFCS 1981, pp. 350–357 (1981)
Hussain, M.A., Khan, P., Sup, K.K.: Wsn research activities for military application. In: Proceedings of the 11th International Conference on Advanced Communication Technology, vol. 1, pp. 271–274. IEEE Press (2009)
Liu, A., Ning, N.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: 7th International Conference on Information Processing in Sensor Networks, pp. 245–256 (April 2008)
Manica, N., Saloni, M., Toldo, P.: WSN - secure comunications with AES algoritms. University of Trento - Faculty of Computer Science (2008)
Mansour, I., Rusinek, D., Chalhoub, G., Lafourcade, P., Ksiezopolski, B.: Multihop node authentication mechanisms for wireless sensor networks. In: Guo, S., Lloret, J., Manzoni, P., Ruehrup, S. (eds.) ADHOC-NOW 2014. LNCS, vol. 8487, pp. 402–418. Springer, Heidelberg (2014)
Munivel, E., Ajit, G.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing, pp. 1–6 (2010)
Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (April 2000)
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security protocols for sensor networks. Wireless Networks (2002)
Certicom Research: Standards for efficient cryptography, sec 1: Elliptic curve cryptography (September 2000)
Yu, C., Lu, C., Kuo, S.: A simple non-interactive pairwise key establishment scheme in sensor networks. In: IEEE International Conference on Sensing, Communication, and Networking, SECON (2009)
Zhang, W., Tran, M., Zhu, S., Cao, G.: A random perturbation-based scheme for pairwise key establishment in sensor networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mansour, I., Chalhoub, G., Lafourcade, P. (2014). Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. In: Kotulski, Z., Księżopolski, B., Mazur, K. (eds) Cryptography and Security Systems. CSS 2014. Communications in Computer and Information Science, vol 448. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44893-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-662-44893-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44892-2
Online ISBN: 978-3-662-44893-9
eBook Packages: Computer ScienceComputer Science (R0)