Skip to main content

2014 | OriginalPaper | Buchkapitel

Distributed Key Certification Using Accumulators for Wireless Sensor Networks

verfasst von : Jun-Young Bae, Claude Castelluccia, Cédric Lauradoux, Franck Rousseau

Erschienen in: Mobile and Ubiquitous Systems: Computing, Networking, and Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform. We observe that our protocol performs best with accumulators based on Elliptic Curve Cryptography (ECC): ECC-based accumulators have roughly the same speed as Secure Bloom filters, but they have a smaller memory footprint.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997) CrossRef Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997) CrossRef
2.
Zurück zum Zitat Benaloh, J.C., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994) CrossRef Benaloh, J.C., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994) CrossRef
3.
Zurück zum Zitat Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)CrossRefMATH Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)CrossRefMATH
4.
Zurück zum Zitat Buttyan, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)CrossRef Buttyan, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)CrossRef
5.
Zurück zum Zitat Camacho, P., Hevia, A.: On the impossibility of batch update for cryptographic accumulators. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 178–188. Springer, Heidelberg (2010) CrossRef Camacho, P., Hevia, A.: On the impossibility of batch update for cryptographic accumulators. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 178–188. Springer, Heidelberg (2010) CrossRef
6.
Zurück zum Zitat Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002) CrossRef Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002) CrossRef
7.
Zurück zum Zitat Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM, March 2005, pp. 524–535. IEEE (2005) Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM, March 2005, pp. 524–535. IEEE (2005)
8.
Zurück zum Zitat Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.) Wireless Sensor Networks, pp. 277–303. Springer, New York (2004) Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.) Wireless Sensor Networks, pp. 277–303. Springer, New York (2004)
9.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security - CCS 2002, November 2002, pp. 41–47. ACM (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security - CCS 2002, November 2002, pp. 41–47. ACM (2002)
10.
Zurück zum Zitat Fan, J., Batina, L., Verbauwhede, I.: HECC goes embedded: an area-efficient implementation of HECC. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 387–400. Springer, Heidelberg (2009) CrossRef Fan, J., Batina, L., Verbauwhede, I.: HECC goes embedded: an area-efficient implementation of HECC. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 387–400. Springer, Heidelberg (2009) CrossRef
12.
Zurück zum Zitat Gollakota, S., Ahmed, N., Zeldovich, N., Katabi, D.: Secure In-Band wireless pairing. In: USENIX Security Symposium, August 2011 Gollakota, S., Ahmed, N., Zeldovich, N., Katabi, D.: Secure In-Band wireless pairing. In: USENIX Security Symposium, August 2011
13.
Zurück zum Zitat Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)MATH Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)MATH
14.
Zurück zum Zitat Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better Bloom filter. Random Struct. Algorithms 33(2), 187–218 (2008)MathSciNetCrossRefMATH Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better Bloom filter. Random Struct. Algorithms 33(2), 187–218 (2008)MathSciNetCrossRefMATH
15.
Zurück zum Zitat Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks - IPSN 2008, April 2008 Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks - IPSN 2008, April 2008
16.
Zurück zum Zitat NIST National Institute of Standards and Technology. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST Special Publication 800-56A, March 2007 NIST National Institute of Standards and Technology. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST Special Publication 800-56A, March 2007
17.
Zurück zum Zitat Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83–87. Springer, Heidelberg (1996) CrossRef Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83–87. Springer, Heidelberg (1996) CrossRef
18.
Zurück zum Zitat Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy - S&P 2005, May 2005 Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy - S&P 2005, May 2005
19.
Zurück zum Zitat Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRefMATH Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: International Conference on Mobile and Ubiquitous Systems - MobiQuitous 2007, August 2007 Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: International Conference on Mobile and Ubiquitous Systems - MobiQuitous 2007, August 2007
21.
Zurück zum Zitat Sun, K., Liu, A., Xu, R., Ning, P., Maughan, W.D.: Securing network access in wireless sensor networks. In: ACM Conference on Wireless Network Security - WISEC 2009, March 2009 Sun, K., Liu, A., Xu, R., Ning, P., Maughan, W.D.: Securing network access in wireless sensor networks. In: ACM Conference on Wireless Network Security - WISEC 2009, March 2009
22.
Zurück zum Zitat Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008) CrossRef Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008) CrossRef
23.
Zurück zum Zitat Verbauwhede, I.: Low budget cryptography to enable wireless security. In: ACM Conference on Wireless Network Security, Invited talk, June 2011 Verbauwhede, I.: Low budget cryptography to enable wireless security. In: ACM Conference on Wireless Network Security, Invited talk, June 2011
24.
Zurück zum Zitat Watro, R.J., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN 2004, October 2004 Watro, R.J., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN 2004, October 2004
25.
Zurück zum Zitat Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Trans. Inf. Syst. E91.D(5), 1489–1491 (2008)CrossRef Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Trans. Inf. Syst. E91.D(5), 1489–1491 (2008)CrossRef
26.
Zurück zum Zitat Zachary, J.: A decentralized approach to secure management of nodes in distributed sensor networks. In: IEEE Military Communications Conference - MILCOM ’03, October 2003 Zachary, J.: A decentralized approach to secure management of nodes in distributed sensor networks. In: IEEE Military Communications Conference - MILCOM ’03, October 2003
Metadaten
Titel
Distributed Key Certification Using Accumulators for Wireless Sensor Networks
verfasst von
Jun-Young Bae
Claude Castelluccia
Cédric Lauradoux
Franck Rousseau
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-11569-6_39