Abstract
In this work, we propose a key certification protocol for wireless sensor networks that allows nodes to autonomously exchange their public keys and verify their authenticity using one-way accumulators. We examine and compare different accumulator implementations for our protocol on the Sun SPOT platform. We observe that our protocol performs best with accumulators based on Elliptic Curve Cryptography (ECC): ECC-based accumulators have roughly the same speed as Secure Bloom filters, but they have a smaller memory footprint.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
References
Barić, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997)
Benaloh, J.C., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422–426 (1970)
Buttyan, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2007)
Camacho, P., Hevia, A.: On the impossibility of batch update for cryptographic accumulators. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 178–188. Springer, Heidelberg (2010)
Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 61. Springer, Heidelberg (2002)
Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM, March 2005, pp. 524–535. IEEE (2005)
Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.) Wireless Sensor Networks, pp. 277–303. Springer, New York (2004)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security - CCS 2002, November 2002, pp. 41–47. ACM (2002)
Fan, J., Batina, L., Verbauwhede, I.: HECC goes embedded: an area-efficient implementation of HECC. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 387–400. Springer, Heidelberg (2009)
Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216. http://eprint.iacr.org/2003/216/ (2003)
Gollakota, S., Ahmed, N., Zeldovich, N., Katabi, D.: Secure In-Band wireless pairing. In: USENIX Security Symposium, August 2011
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
Kirsch, A., Mitzenmacher, M.: Less hashing, same performance: building a better Bloom filter. Random Struct. Algorithms 33(2), 187–218 (2008)
Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks - IPSN 2008, April 2008
NIST National Institute of Standards and Technology. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST Special Publication 800-56A, March 2007
Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83–87. Springer, Heidelberg (1996)
Parno, B., Perrig, A., Gligor, V.D.: Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy - S&P 2005, May 2005
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Singelée, D., Preneel, B.: Key establishment using secure distance bounding protocols. In: International Conference on Mobile and Ubiquitous Systems - MobiQuitous 2007, August 2007
Sun, K., Liu, A., Xu, R., Ning, P., Maughan, W.D.: Securing network access in wireless sensor networks. In: ACM Conference on Wireless Network Security - WISEC 2009, March 2009
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)
Verbauwhede, I.: Low budget cryptography to enable wireless security. In: ACM Conference on Wireless Network Security, Invited talk, June 2011
Watro, R.J., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks - SASN 2004, October 2004
Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Trans. Inf. Syst. E91.D(5), 1489–1491 (2008)
Zachary, J.: A decentralized approach to secure management of nodes in distributed sensor networks. In: IEEE Military Communications Conference - MILCOM ’03, October 2003
Acknowledgement
This work was partially supported by the French National Research Agency projects ARESA2 and IRIS under contracts ANR-09-VERS-017 and ANR-11-INFR-016 respectively, and the European Commission FP7 project CALIPSO under contract 288879.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bae, JY., Castelluccia, C., Lauradoux, C., Rousseau, F. (2014). Distributed Key Certification Using Accumulators for Wireless Sensor Networks. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-11569-6_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11568-9
Online ISBN: 978-3-319-11569-6
eBook Packages: Computer ScienceComputer Science (R0)