Skip to main content
Erschienen in: Wireless Personal Communications 2/2014

01.07.2014

TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks

verfasst von: Limin Ma, Yu Ge, Yuesheng Zhu

Erschienen in: Wireless Personal Communications | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure communication over wireless body area network (WBAN) is a key issue in the design and deployment of WBAN systems, in which the authentication of sensor node is a critical process. Conventional authentication schemes are not suitable to the sensor node because of the limitations of memory, computational power and energy in the node. In order to provide an efficient method to verify the identity of sender sensor nodes of WBAN, in this paper a lightweight authentication scheme, TinyZKP, based on zero-knowledge proof (ZKP) is proposed and implemented on TinyOS-based sensor nodes. Our experimental results show that, compared to two ECDSA-based authentication schemes in TinyECC and WM-ECC, the TinyZKP runs 1.9 and 1.4 times faster and the energy cost is reduced by 48 % and 28 %, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liang, X., Li, X., Shen, Q., Lu, R., Lin, X., Shen, X., et al. (2012). Exploiting prediction to enable secure and reliable routing in wireless body area networks. In Proceedings of INFOCOM’12 (pp. 388–396). Orlando, FL, USA: IEEE. Liang, X., Li, X., Shen, Q., Lu, R., Lin, X., Shen, X., et al. (2012). Exploiting prediction to enable secure and reliable routing in wireless body area networks. In Proceedings of INFOCOM’12 (pp. 388–396). Orlando, FL, USA: IEEE.
2.
Zurück zum Zitat Ameen, M. A., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.CrossRef Ameen, M. A., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93–101.CrossRef
3.
Zurück zum Zitat Neuman, C., Yu, T., Hartman, S., & Raeburn, K. (2005). The Kerberos network authentication service (V5), RFC 4120, IETF. Neuman, C., Yu, T., Hartman, S., & Raeburn, K. (2005). The Kerberos network authentication service (V5), RFC 4120, IETF.
4.
Zurück zum Zitat Housley, R., Polk, W., Ford, W., & Solo, D. (2002). Internet X.509 public key infrastructure certificate and certificate revocation list (crl) profile, RFC 3280, IETF. Housley, R., Polk, W., Ford, W., & Solo, D. (2002). Internet X.509 public key infrastructure certificate and certificate revocation list (crl) profile, RFC 3280, IETF.
5.
Zurück zum Zitat Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor system (pp. 162–175). New York, USA: ACM. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor system (pp. 162–175). New York, USA: ACM.
6.
Zurück zum Zitat Luk, M., Mezzour, G., Perrig, A., & Gligor, V. (2007). MiniSec: A secure sensor network communication architecture. In Proceedings of 6th international conference on information processing in sensor networks (pp. 479–488). Cambridge, England: IEEE. Luk, M., Mezzour, G., Perrig, A., & Gligor, V. (2007). MiniSec: A secure sensor network communication architecture. In Proceedings of 6th international conference on information processing in sensor networks (pp. 479–488). Cambridge, England: IEEE.
7.
Zurück zum Zitat Perrig, A., Canetti, R., Tygar, J.-D., & Song, D. (2002). The TESLA broadcast authentication protocol. UC Berkeley and IBM Research, 5(2), 2–13. Perrig, A., Canetti, R., Tygar, J.-D., & Song, D. (2002). The TESLA broadcast authentication protocol. UC Berkeley and IBM Research, 5(2), 2–13.
8.
Zurück zum Zitat AlMheiri, S. M., & AlQamzi, H. S. (2013). Data link layer security protocols in wireless sensor networks: A survey. In Proceedings of 10th IEEE international conference on networking, sensing and control (pp. 312–317). Evry, France: IEEE. AlMheiri, S. M., & AlQamzi, H. S. (2013). Data link layer security protocols in wireless sensor networks: A survey. In Proceedings of 10th IEEE international conference on networking, sensing and control (pp. 312–317). Evry, France: IEEE.
9.
Zurück zum Zitat Ullah, F., Ahmad, M., Habib, M., & Muhammad, J. (2011). Analysis of security protocols for wireless sensor networks. In Proceedings of 3rd international conference on computer research and development (pp. 383–387). Shanghai, China: IEEE. Ullah, F., Ahmad, M., Habib, M., & Muhammad, J. (2011). Analysis of security protocols for wireless sensor networks. In Proceedings of 3rd international conference on computer research and development (pp. 383–387). Shanghai, China: IEEE.
10.
Zurück zum Zitat Chuchaisri, P., & Newman, R. (2012). Fast response PKC-based broadcast authentication in wireless sensor networks. Mobile Networks & Applications, 17(4), 508–525.CrossRef Chuchaisri, P., & Newman, R. (2012). Fast response PKC-based broadcast authentication in wireless sensor networks. Mobile Networks & Applications, 17(4), 508–525.CrossRef
11.
Zurück zum Zitat Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceedings of 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59–64). New York, USA: ACM. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., & Kruus, P. (2004). TinyPK: Securing sensor networks with public key technology. In Proceedings of 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59–64). New York, USA: ACM.
12.
Zurück zum Zitat Tripathy, S. (2010). Tin-key: Effective key-establishment for wireless sensor. In Proceedings of 10th IEEE international conference on computer and information technology (pp. 916–921). Bradford, England: IEEE. Tripathy, S. (2010). Tin-key: Effective key-establishment for wireless sensor. In Proceedings of 10th IEEE international conference on computer and information technology (pp. 916–921). Bradford, England: IEEE.
13.
Zurück zum Zitat Wang, W. H., Cui, Y. L., & Chen, T. M. (2009). Design and implementation of an ECDSA-based identity authentication protocol on WSN. In Proceedings of 3rd IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications (pp. 1202–1205). Beijing, China: IEEE. Wang, W. H., Cui, Y. L., & Chen, T. M. (2009). Design and implementation of an ECDSA-based identity authentication protocol on WSN. In Proceedings of 3rd IEEE international symposium on microwave, antenna, propagation and EMC technologies for wireless communications (pp. 1202–1205). Beijing, China: IEEE.
14.
Zurück zum Zitat Wang, H. D., Sheng, B., Tan, C. C., & Li, Q. (2011). Public-key based access control in sensornet. Wireless Networks, 17(5), 1217–1234.CrossRef Wang, H. D., Sheng, B., Tan, C. C., & Li, Q. (2011). Public-key based access control in sensornet. Wireless Networks, 17(5), 1217–1234.CrossRef
15.
Zurück zum Zitat Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, 11(1), 182–189.CrossRef Shim, K. A., Lee, Y. R., & Park, C. M. (2013). EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, 11(1), 182–189.CrossRef
16.
Zurück zum Zitat JayaKumar, C., & Sujihelen, L. (2013). Authentication solutions for wireless sensor network based on virtual certificate authority. In 2013 International conference on circuits, power and computing technologies (pp. 1003–1007). Nagercoil, India: IEEE. JayaKumar, C., & Sujihelen, L. (2013). Authentication solutions for wireless sensor network based on virtual certificate authority. In 2013 International conference on circuits, power and computing technologies (pp. 1003–1007). Nagercoil, India: IEEE.
18.
Zurück zum Zitat Feige, U., Fiat, A., & Shamir, A. (1987). Zero-knowledge proofs of identity. In Proceedings of 19th annual ACM symposium on the theory of computing (pp. 210–217). New York, USA: ACM. Feige, U., Fiat, A., & Shamir, A. (1987). Zero-knowledge proofs of identity. In Proceedings of 19th annual ACM symposium on the theory of computing (pp. 210–217). New York, USA: ACM.
19.
Zurück zum Zitat Udgata, S., Mubeen, A., & Sabat, S. (2011). Wireless sensor network security model using zero knowledge protocol. In Proceedings of 2011 IEEE international conference on communications (ICC) (pp. 1–5). Kyoto, Japan: IEEE. Udgata, S., Mubeen, A., & Sabat, S. (2011). Wireless sensor network security model using zero knowledge protocol. In Proceedings of 2011 IEEE international conference on communications (ICC) (pp. 1–5). Kyoto, Japan: IEEE.
20.
Zurück zum Zitat Cheng, M. Q. (2009). A Zero-knowledge proof of digital signature scheme based on the elliptic curve cryptosystem. In Proceedings of 3rd international symposium on intelligent information technology application (pp. 612–615). Nanchang, China: IEEE. Cheng, M. Q. (2009). A Zero-knowledge proof of digital signature scheme based on the elliptic curve cryptosystem. In Proceedings of 3rd international symposium on intelligent information technology application (pp. 612–615). Nanchang, China: IEEE.
21.
Zurück zum Zitat Fiat, A., & Shamir, A. (1987). How to prove yourself: practical solutions to identification and signature problems. In Advances in cryptology-CRYPTO’86 (pp. 186–194). Berlin: Springer. Fiat, A., & Shamir, A. (1987). How to prove yourself: practical solutions to identification and signature problems. In Advances in cryptology-CRYPTO’86 (pp. 186–194). Berlin: Springer.
22.
Zurück zum Zitat Yang, B. (2009). Study on security of wireless sensor network based on zigbee standard. In Proceedings of CIS ’09 international conference on computational intelligence and security (pp. 426–430). Beijing, China: IEEE. Yang, B. (2009). Study on security of wireless sensor network based on zigbee standard. In Proceedings of CIS ’09 international conference on computational intelligence and security (pp. 426–430). Beijing, China: IEEE.
24.
Zurück zum Zitat Zhang, F., Dojen, R., & Coffey, T. (2011). Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. International Journal of Sensor Networks, 10(4), 192–201.CrossRef Zhang, F., Dojen, R., & Coffey, T. (2011). Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node. International Journal of Sensor Networks, 10(4), 192–201.CrossRef
25.
Zurück zum Zitat Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (pp. 245–256). St. Louis, USA: IEEE. Liu, A., & Ning, P. (2008). TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on information processing in sensor networks (pp. 245–256). St. Louis, USA: IEEE.
Metadaten
Titel
TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks
verfasst von
Limin Ma
Yu Ge
Yuesheng Zhu
Publikationsdatum
01.07.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1555-4

Weitere Artikel der Ausgabe 2/2014

Wireless Personal Communications 2/2014 Zur Ausgabe