The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2011 vol.8)
pp: 363-376
Kealan McCusker , Dublin City University, Dublin
Noel E. O'Connor , Dublin City University, Dublin
In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented. The scheme is analyzed on the ARM920T processor and measurements were taken for the runtime and energy of its components. It was found that the Tate pairing component of the scheme consumes significant amounts of energy, and so should be ported to hardware. An accelerator was implemented in 65 nm Complementary Metal Oxide Silicon (CMOS) technology and area, timing, and energy figures have been obtained for the design. Results indicate that a hardware implementation of IBC would meet the strict energy constraint required of a wireless sensor network node.
Wireless sensor networks, identity-based cryptography, hardware architecture.
Kealan McCusker, Noel E. O'Connor, "Low-Energy Symmetric Key Distribution in Wireless Sensor Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 3, pp. 363-376, May/June 2011, doi:10.1109/TDSC.2010.73
[1] J.M. Rabaey, M. Ammer, J.L. da SilvaJr., D. Patel, and S. Roundy, "PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking," Computer, vol. 33, no. 7, pp. 42-48, July 2000.
[2] J.L. Hill, "System Architecture for Wireless Sensor Networks," PhD dissertation, Univ. California, Berkeley, http://www.cs. berkeley.edujhill, 2003.
[3] A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensors Networks," Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
[4] H. Chan and A. Perrig, "Security and Privacy in Sensors Networks," Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
[5] C. Savarese, J.M. Rabaey, and J. Beutel, "Locationing in Distributed Ad-Hoc Wireless Sensor Networks," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing (ICASSP), May 2001.
[6] A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. Crypto '84, pp. 47-54, Aug. 1984.
[7] B. Doyle, S. Bell, A.F. Smeaton, K. McCusker, and N. O'Connor, "Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks," The Computer J., vol. 49, no. 4, pp. 443-453, 2006.
[8] H.-B. Cheng, G. Yang, J.-T. Wang, and X. Huang, "An Authenticated Identity-Based Key Establishment and Encryption Scheme for Wireless Sensor Networks," The J. China Univ. of Posts and Telecomm., vol. 13, no. 1, pp. 31-38, 2006.
[9] L. Oliveira, M. Scott, J. Lopez, and R. Dahab, "TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks," Proc. Fifth Int'l Conf. Networked Sensing Systems (INSS '08), pp. 173-180, June 2008.
[10] P. Szczechowiak, A. Kargl, M. Scott, and M. Collier, "On the Application of Pairing Based Cryptography to Wireless Sensor Networks," Proc. Second ACM Conf. Wireless Network Security (WiSec '09), pp. 1-12, 2009.
[11] Y.H. Kim, H. Lee, J.H. Park, L.T. Yang, and D.H. Lee, "Key Establishment Scheme for Sensor Networks with Low Communication Cost," Proc. Fourth Int'l Autonomic and Trusted Computing, pp. 441-448, 2007.
[12] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
[13] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-614, 2003.
[14] MICA2 Wireless Measurement System, Crossbow Technology, http:/, 2011.
[15] R. Adler, M. Flanigan, J. Huang, R. Kling, N. Kushalnagar, L. Nachman, C.-Y Wan, and M. Yarvis, "Intel Mote 2: An Advanced Platform for Demanding Sensor Network Applications," Proc. Third Int'l Conf. Embedded Networked Sensor Systems (SenSys '05), pp. 298-298, 2005.
[16] D. Hankerson, A.J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag New York, 2003.
[17] L.C. Washington, Elliptic Curves, Number Theory and Cryptography. Chapman & Hall/CRC, 2003.
[18] I. Blake, G. Seroussi, N. Smart, and J.W.S. Cassels, Advances in Elliptic Curve Cryptography. Cambridge Univ. Press, 2005.
[19] I.M. Duursma and H.-S Lee, "Tate Pairing Implementation for Hyperelliptic Curves ${\rm y}^{2}= {\rm x}^{{\rm p}}-{\rm x} + {\rm d}$ ," Proc. Ninth Int'l Conf. Theory and Applications of Cryptology and Information Security (ASIACRYPT), pp. 111-123, 2003.
[20] S. Kwon, "Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields." Proc. 10th Australasian Conf. Information Security and Privacy (ACISP), pp. 134-145, 2005.
[21] P.S.L.M. Barreto, S. Galbraith, C.O. hEigeartaigh, and M. Scott, "Efficient Pairing Computation on Supersingular Abelian Varieties," Report 2004/375, Cryptology ePrint Archive, http:/, 2004.
[22] L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 41-47, 2002.
[23] H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," Proc. Symp. Security and Privacy, pp. 197-213, May 2003.
[24] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences," Proc. Advances in Cryptology, pp. 471-486, 1993.
[25] R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Proc. EUROCRYPT '84 Workshop Advances in Cryptology: Theory and Applications of Cryptographic Techniques, pp. 335-338, 1985.
[26] D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, 2005.
[27] W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, 2005.
[28] R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems Based on Pairing," Proc. Symp. Cryptography and Information Security (SCIS '00), pp. 26-28, Jan. 2000.
[29] P.S.L.M. Barreto, B. Libert, N. McCullagh, and J.-J Quisquater, "Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps," Proc. 11th Int'l Conf. Theory and Application of Cryptology and Information Security, Advances in Cryptology (ASIACRYPT), pp. 515-532, 2005.
[30] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 370-380, Feb. 2006.
[31] J.R. Douceur, "The Sybil Attack," Proc. Int'l Workshop Peer-to-Peer Systems (IPTPS), pp. 251-260, 2002.
[32] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), pp. 259-268, 2004.
[33] "Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL)," M. Scott, , 2008.
[34] "ARM922T," ARM, http:/, 2011.
[35] S. Roundy, D. Steingart, L. Frechette, P.K. Wright, and J.M. Rabaey, "Power Sources for Wireless Sensor Networks," Proc. First European Workshop Wireless Sensor Networks (EWSN), pp. 1-17, 2004.
[36] E.D. Mastrovito, "VLSI Architectures for Computation in Galois Fields," PhD dissertation, Linköping Univ., 1989.
[37] A. Karatsuba and Y. Ofman, "Multiplication of Many-Digital Numbers by Automatic Computers," Translation in Physics-Doklady, vol. 7, pp. 595-596, 1963.
[38] K. Fong, D. Hankerson, J. Lopez, and A. Menezes, "Field Inversion and Point Halving Revisited," IEEE Trans. Computers, vol. 53, no. 8, pp. 1047-1059, Aug. 2004.
[39] R.J. McEliece, Finite Fields for Computer Scientists and Engineers. Kluwer Academic Publishers, 1987.
[40] T. Itoh and S. Tsujii, "A Fast Algorithm for Computing Multiplicative Inverses in $GF(2^m)$ Using Normal Bases," Information and Computation, vol. 78, no. 3, pp. 171-177, 1988.
[41] J. Guajardo and C. Paar, "Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes," Designs, Codes and Cryptography, vol. 25, no. 2, pp. 207-216, 2002.
[42] TSMC 65nm Technology Platform, Taiwan Semiconductor Manufacturing Company, http:/, 2011.
[43] "Synopsys," Synopsys, http:/, 2011.
[44] C. Shu, K. Gaj, and S. Kwon, "FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields," Proc. IEEE Int'l Conf. Field Programmable Technology (FPT '06), pp. 173-180, Dec. 2006.
[45] T. Kerins, C. Murphy, C.O. hEigeartaigh, R. Ronan, and M. Scott, "FPGA Acceleration of the Tate Pairing in Characteristic 2," Proc. IEEE Int'l Conf. Field Programmable Technology, pp. 213-220, Dec. 2006.
[46] M. Keller, T. Kerins, F. Crowe, and W. Marnane, "FPGA Implementation of a ${GF}(2^m)$ Tate Pairing Architecture," Proc. Int'l Workshop Applied Reconfigurable Computing (ARC), pp. 358-369, 2006.
[47] M. Keller, R. Ronan, W. Marnane, and C. Murphy, "A ${GF}(2^{4m})$ Inverter and Its Application in a Reconfigurable Tate Pairing Processor," Proc. IEEE Int'l Conf. Reconfigurable Computing and FPGA's, pp. 1-10, Sept. 2006.
12 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool