skip to main content
10.1145/1860079.1860090acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Flexible key exchange negotiation for wireless sensor networks

Published:20 September 2010Publication History

ABSTRACT

Despite recent improvements of the capabilities of Wireless Sensor Networks (WSN) nodes, network protocol support for key management is still lagging behind. While in traditional networks well known protocol suites (e.g., IPsec IKE and the TLS handshake), are commonly used for flexible negotiation of the cryptographic and key exchange protocols, to the best of our knowledge no similar support has been provided for the same operation in WSNs. The goal of this paper is therefore threefold. We discuss the design of a flexible security negotiation protocol for WSNs, and we suggest to adapt TLS handshake ideas to obtain maximum flexibility. We design and implement a security association set up protocol, tailored to the resource constraints and limits of WSN nodes. Finally, we run an experimental assessment of this protocol operations in support of RSA key transport, Elliptic Curve Diffie-Hellman key agreement, and Identity Based Encryption key agreement.

References

  1. }}I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless sensor networks: a survey", Computer Networks, Vol. 38(4), Mar. 2002, pp. 393--422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}C. Garcia-Hernandez, P. Ibarguengoytia-Gonzales, J. Garcia-Hernandez, J. Perez-Diaz, "Wireless Sensor Networks and Applications - a Survey", Int. J. of Computer Science and Network Security, Vol. 7(3), Mar. 2007, pp. 264--273.Google ScholarGoogle Scholar
  3. }}C. Kaufman, editor, "Internet Key Exchange (IKEv2) Protocol", IETF RFC 4306, Dec. 2005.Google ScholarGoogle Scholar
  4. }}T. Dierks, E. Rescorla, "The Transport Layer Security (TLS) Protocol, Version 1.2", IETF RFC 5246, Aug. 2008.Google ScholarGoogle Scholar
  5. }}A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. of CRYPTO 84 on Advances in cryptology, Santa Barbara, CA, USA, 1985, pp. 47--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}D. Malan, M. Welsh, M. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography", IEEE Sensor and Ad Hoc Communications and Networks, SECON 2004, pp. 71--80.Google ScholarGoogle Scholar
  7. }}G. Gaubatz, J. P. Kaps, B. Sunar, "Public key cryptography in sensor networks", 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004).Google ScholarGoogle Scholar
  8. }}C. Karlof, N. Sastry, D. Wagner, "TinySec: a link layer security architecture for wireless sensor networks", Proc. of the 2nd Int. Conf. on Embedded networked sensor systems, SenSys 2004, Baltimore, MD, USA, pp. 162--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}M. Luk, G. Mezzour, A. Perrig, V. Gligor, "MiniSec: a secure sensor network communication architecture", 6th Int. Conf. on Information processing in sensor networks, IPSN 2007, Cambridge, MA, USA, 2007, pp. 479--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}V. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle, S. C. Shantz, "Sizzle: a standards-based end-to-end security architecture for the embedded Internet", Sun Microsystems, Inc., Technical Reports, SERIES 13103, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}S. Fouladgar, B. Mainaud, K. Masmoudi, H. Afifi, "Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks", Springer LNCS, Vol. 4357/2006, Security and Privacy in Ad-Hoc and Sensor Networks, Mar. 2007, pp. 32--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, B. Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)", IETF RFC 4492, May 2006.Google ScholarGoogle Scholar
  13. }}E. Rescorla, N. Modadugu, "Datagram Transport Layer Security", IETF RFC 4347, April 2006.Google ScholarGoogle Scholar
  14. }}R. Rivest, A Shamir, L. Adleman, "A method for obtaining Digital Signatures and Public Key Cryptosystems", Communications of the ACM. Feb., 1978 21(2) pages 120--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}A. K. Lenstra, E. R. Verheul, "Selecting Cryptographic Key Sizes", Journal of Cryptology: the journal of the International Association for Cryptologic Research, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, "Recommendation for Key Management - Part 1: General (Revised)", NIST Special Publication 800--57, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}S. D. Galbraith, K. G. Paterson, N. P. Smart, "Pairings for cryptographers", Discrete Applied Mathematics, Vol. 156(16), 2008, 3113--3121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}B. Parno, A. Perrig, V. Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks", Proc. of the IEEE Symp. on Security and Privacy, Oakland, CA, May, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}http://www.ist-ubisecsens.org/downloads/tinyrng/tinyrng.ph.Google ScholarGoogle Scholar
  20. }}http://code.google.com/p/relic-toolkit.Google ScholarGoogle Scholar
  21. }}http://discovery.csc.ncsu.edu/software/TinyECC.Google ScholarGoogle Scholar
  22. }}R. Sakai, K. Ohgishi, M. Kasahara, "Cryptosystems based on pairing", Symp. Cryptography and Information Security, SCIS 2000, Jan 2000, pp. 26--28.Google ScholarGoogle Scholar
  23. }}P. Barreto, S. Galbraith, C. Heigeartaigh, M. Scott, "Efficient pairing computation on supersingular abelian varieties", Designes Codes And Cryptography, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}L. B. Oliveira, M. Scott, J. Lopez, R. Dahab, "TinyPBC: Pairings for authenticated identity-basednon-interactive key distribution in sensor networks", Networked Sensing Systems, 2008, pp. 173--180..Google ScholarGoogle Scholar

Index Terms

  1. Flexible key exchange negotiation for wireless sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiNTECH '10: Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
          September 2010
          88 pages
          ISBN:9781450301404
          DOI:10.1145/1860079

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 September 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate63of100submissions,63%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader