Analysis of Public-Key Cryptography for Wireless Sensor Networks Security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Analysis of Public-Key Cryptography for Wireless Sensor Networks Security

Authors: F. Amin, A. H. Jahangir, H. Rasifard

Abstract:

With the widespread growth of applications of Wireless Sensor Networks (WSNs), the need for reliable security mechanisms these networks has increased manifold. Many security solutions have been proposed in the domain of WSN so far. These solutions are usually based on well-known cryptographic algorithms. In this paper, we have made an effort to survey well known security issues in WSNs and study the behavior of WSN nodes that perform public key cryptographic operations. We evaluate time and power consumption of public key cryptography algorithm for signature and key management by simulation.

Keywords: Wireless Sensor Networks, Security, Public Key Cryptography, Key Management.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1329581

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3697

References:


[1] D. Djenouri, L. Khelladi, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Communication Surveys and Tutorials, vol. 7, no. 4, pp. 2-28, December 2005.
[2] G. Gaubatz, J-P. Kaps, B. Sunar, "Public Key Cryptography in Sensor Networks Revisited", 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Lecture Notes in Computer Science, vol. 3313, Springer, Heidelberg, pp. 2-18, August, 2004.
[3] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
[4] A. Baggio, "Wireless sensor networks in precision agriculture", in ACM Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 2005.
[5] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson, "Wireless Sensor Networks for Habitat Monitoring", in First ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, September 2002.
[6] G. Fuchs, S. Truchat, F. Dressler, "Distributed Software Management in Sensor Networks using Profiling Techniques", in 1st IEEE/ACM International Conference on Communication System Software and Middleware (IEEE COMSWARE 2006): 1st International Workshop on Software for Sensor Networks (SensorWare 2006), New Dehli, India, January 2006.
[7] W. Zhang, G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach", in 24th IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2005), pp. 503-514, March 2005.
[8] K. Piotrowski, P. Langendoerfer, S. Peter, "How Public Key Cryptography Influences Wireless Sensor Node Lifetime", Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, USA, pp.169 - 176, 2006
[9] Y. W. Law, "Key Management and Link-Layer Security of WSN", Ph.D. Thesis, University of Twente, Netherland, 2005.
[10] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D..Tygar. "SPINS: Security Protocols for Sensor Networks," in Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, pp. 189-199, July 2001..
[11] S. Zhu, S. Setia, S. Jajodia. "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", In the Proceedings of the 10th ACM conference on Computer and communications security, 2003.
[12] J. P. Walters, Zh. Liang, W. Shi, V. Chaudhary, "Security in Distributed, Grid, and Pervasive Computing", Chapter 17, CRC Press, 2006.
[13] R. B. Ghazali, "Security in WSN in Enhance AODV Routing", Masters thesis, Faculty of Electrical Engineering, University Technology Malaysia, 2006.
[14] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, Vol. 48, 1987.
[15] V.S. Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology CRYPTO 85, 1986.
[16] A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996.
[17] W. Du, J. Deng, Y. S. Han, Shigang Chen, P.K. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge", IEEE INFOCOM 2004.
[18] B. C. Neuman, T. Tso, "Kerberos: An authentication service for computer networks", IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994.
[19] W. Diffie, M. E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976.
[20] R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[21] A. S. Wander, N. Gura, H. Eberle, V. Gupta, Sh. Ch. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks", In PERCOM -05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, pp. 324-328, Washington, DC, USA, 2005. IEEE Computer Society.
[22] ATmega128(L) Data Sheet (2006). Atmel Corporation, Available at: http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf