Skip to main content

An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks

  • Conference paper
Book cover Lightweight Cryptography for Security and Privacy (LightSec 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8162))

Abstract

In this work we present the first implementation of the Dahmen-Krauß Hash-Chain Signature Scheme (DKSS) for short messages on a Wireless Sensor Node. We point out one error in the originally proposed scheme concerning the specification of the employed pseudo-random number generator and provide a corrected specification. We also give a new time-memory trade-off between signing time and private key size. We present performance results for various message-lengths, which are a parameter of this scheme, for two different choices for the block cipher used to build the one-way functions employed in this scheme, allowing comparisons with previous implementations of other public-key signature schemes. Furthermore, we describe our implementation of a synchronization protocol, needed in practical applications of this scheme whenever a node lacks the predecessor of a signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Contiki home page, http://www.contiki-os.org/

  2. Mspsim home page, http://sourceforge.net/apps/mediawiki/mspsim/index.php?title=Main_Page

  3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  4. Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost elliptic curve cryptography for wireless sensor networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 6–17. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Croce, S., Marcelloni, F., Vecchio, M.: Reducing power consumption in wireless sensor networks using a novel approach to data aggregation. Comput. J. 51(2), 227–239 (2008)

    Article  Google Scholar 

  6. Dahmen, E., Krauß, C.: Short hash-based signatures for wireless sensor networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 463–476. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Dods, C., Smart, N.P., Stam, M.: Hash based digital signature schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96–115. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Osterlind, A.D.F.: Contiki programming course: Hands-on session notes. Swedish Institute of Computer Science, Siena (2009)

    Google Scholar 

  9. Gaubatz, G., Kaps, J.-P., Ozturk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOMW 2005, pp. 146–150. IEEE Computer Society, Washington, DC (2005)

    Chapter  Google Scholar 

  10. Netsim homepage, http://tetcos.com/

  11. Cooja homepage, http://www.sics.se/contiki/wiki/index.php/Cooja

  12. Jinwala, D., Patel, D., Dasgupta, K.: Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 258–272. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967–2978 (2010)

    Article  Google Scholar 

  14. Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks

    Google Scholar 

  15. Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: The design of an acquisitional query processor for sensor networks. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003, pp. 491–502. ACM, New York (2003)

    Chapter  Google Scholar 

  16. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  17. Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible differential cryptanalysis of reduced round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 49–60. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, pp. 169–176. ACM, New York (2006)

    Chapter  Google Scholar 

  19. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Wheeler, D., Needham, R.: Tea extensions (1997) (unpublished)

    Google Scholar 

  21. Wheeler, D., Needham, R.: Tea, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  22. Yarrkov, E.: Cryptanalysis of xxtea. Cryptology ePrint Archive, Report 2010/254 (2010), http://eprint.iacr.org/

  23. Yum, D.H., Seo, J.W., Eom, S., Lee, P.J.: Single-layer fractal hash chain traversal with almost optimal complexity. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 325–339. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mourier, N., Stampp, R., Strenzke, F. (2013). An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks. In: Avoine, G., Kara, O. (eds) Lightweight Cryptography for Security and Privacy. LightSec 2013. Lecture Notes in Computer Science, vol 8162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40392-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40392-7_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40391-0

  • Online ISBN: 978-3-642-40392-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics