Skip to main content
Log in

Certificateless based Quantum Cryptosystem for Ad-Hoc UWB-IR

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Ad-Hoc UWB-IR technology is being researched and exploited in different fields. Some of its potential applications include Military solutions, emergency search and rescue, collaborative computing, distributed computing, and smart-home applications. Yet, in any of the previously cited domains, Information and network security is a corner stone. Consequently, it becomes mandatory to guarantee the confidentiality, integrity, authenticity and availability of the different assets present in the network through the usage of adequate cryptography protocols and technics. In this paper we discussed the security specifications of the IEEE 802.15.4 standard based Symmetric Key Cryptography (SKC) scheme. Then, we briefly introduced some of the different vulnerabilities and weaknesses present in this scheme. In fact, we arrived to prove that Public Key Cryptography PKC offers better key management and communications security results SKC. We demonstrated that Certificateless (CL-PKC) scheme is the most suitable Asymmetric Key Management protocol for Ad-Hoc UWB-IR networks. Finally, after a very intense and extreme evaluation of different Quantum Public Key Cryptosystem (QPKCS), we concluded that the most optimum one to be used with the CL scheme in order to secure key management and data communications in Ad- Hoc UWB-IR Networks is the Algebraic Eraser (AE) protocol based on braid groups.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. IEEE Standards Association. Part 15.4 : Low-rate wireless personal area networks (lr-wpans)

  2. Rogaway, P., et al. (2003). OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 6(3), 365–403.

    Article  Google Scholar 

  3. Fouque, P.-A., Martinet, G., Valette, F., & Zimmer, S. (2008). On the security of the ccm encryption mode and of a slight variant. In Applied cryptography and network security (pp. 411–428). Berlin: Springer.

  4. Lee, J., Leung, V., Wong, K., Cao, J., & Chan, H. (2007). Key management issues in wireless sensor networks: current proposals and future developments. Wireless Communications, IEEE, 14, 76–84.

    Article  Google Scholar 

  5. Menezes, A. J., Vanstone, S. A., & Oorschot, P. C. V. (1996). Handbook of applied cryptography (1st ed.). Boca Raton: CRC Press, Inc.

    MATH  Google Scholar 

  6. Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04, New York, NY, USA (pp. 162–175). ACM.

  7. Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon, N., Bessell, T., Rutten, M., & Jha, S. (2006). Wireless sensor networks for battlefield surveillance. In Proceedings of the land warfare conference (LWC).

  8. Li, D., Wong, K., Hu, Y. H., & Sayeed, A. (2002). Detection, classification, and tracking of targets. Signal Processing Magazine, IEEE, 19, 17–29.

    Google Scholar 

  9. Meesookho, C., Narayanan, S., & Raghavendra, C. (2002). Collaborative classification applications in sensor networks. In Sensor array and multichannel signal processing workshop proceedings (pp. 370–374).

  10. Sinopoli, B., Sharp, C., Schenato, L., Schaffert, S., & Sastry, S. (2003). Distributed control applications within sensor networks. Proceedings of the IEEE, 91, 1235–1246.

    Article  Google Scholar 

  11. Padmavathi, G., Dr., & Shanmugapriya, M. D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. ArXiv e-prints.

  12. Bonaci, T., Bushnell, L., & Poovendran, R. (2010). Node capture attacks in wireless sensor networks: A system theoretic approach. In CDC (pp. 6765–6772).

  13. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. CoRR, vol. arXiv:abs/0909.0576.

  14. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS 02: Proceedings of the 9th ACM conference on Computer and communications security, New York, NY, USA (pp. 41–47), ACM.

  15. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In 2003 symposium on security and privacy, Proceedings (pp. 197–213).

  16. Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceedings of the EUROCRYPT 84 workshop on advances in cryptology: Theory and application of cryptographic techniques, New York, NY, USA (pp. 335–338). New York: Springer- Verlag Inc.

  17. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In CRYPTO ’92: Proceedings of the 12th annual international cryptology conference on advances in cryptology, London, UK (pp. 471–486). Berlin: Springer.

  18. Shan, T. H., & Liu, C. M. (2008). Enhancing the key pre-distribution scheme on wireless sensor networks. In Proceedings of the 2008 IEEE Asia-Pacific services computing conference, Washington, DC, USA (pp. 1127–1131). IEEE Computer Society.

  19. Du, W., Wang, R., & Ning, P. (2005). An efficient scheme for authenticating public keys in sensor networks. In In 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc 05, pp. 58–67). ACM Press.

  20. Xie, Miao, Han, Song, Tian, Biming, & Parvin, Sazia. (2011). Anomaly detection in wireless sensor networks : A survey. Journal of Network and Computer Applications, 34(4), 1302–1325.

    Article  Google Scholar 

  21. Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2007). Intrusion detection of sinkhole attacks in wireless sensor networks. In International symposium on algorithms and experiments for sensor systems, wireless networks and distributed robotics (pp. 150–161). Berlin: Springer.

  22. Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Lidea. distributed lightweight intrusion detection architecture for sensor networks. In Proceedings of the 4th international conference on Security and privacy in communication netowrks (p. 20). ACM.

  23. Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. C. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceeedings of the 6th international workshop on cryptographic hardware and embedded systems, Boston, Massachusetts.

  24. Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. In 35th annual symposium on foundations of computer science, 1994 proceedings. IEEE.

  25. Hoffstein, J., Pipher, J., & Silverman, J. H. (1998). NTRU: A ring-based public key cryptosystem. In ANTS III- algorithmic number theory (pp. 267–288).

  26. Gaubatz, G., Kaps, J., Sunar, B. (2004). Public key cryptography in sensor networks. In 1st European workshop on security in ad-hoc and sensor networks ESAS 2004 (pp. 2–18).

  27. McEliece, R. (1978). A public key cryptosystem based on algebraic coding theory. DSN progress report.

  28. Ko, K. H., Lee, S. J., Cheon, J. H., Han, J. W., Kang, J. S., & Park, C. S. (2000). New public-key cryptosystem using braid groups, advances in cryptology. In Proceedings of CRYPTO 2000, lecture notes in computer science, 1880 (pp. 166–183). Berlin: Springer.

  29. Anshel, I., Anshel, M., Goldfeld, D., & Lemieux, S. (2006). Key agreement, the algebraic eraserTM, and lightweight cryptography. Contemporary Mathematics, 418, 1–34.

    Article  Google Scholar 

  30. Moteiv Corporation Telos (Rev B): PRELIMINARY Datasheet (12/5/2004).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamel Miri.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miri, J., Nsiri, B. & Bouallegue, R. Certificateless based Quantum Cryptosystem for Ad-Hoc UWB-IR. Wireless Pers Commun 114, 1805–1823 (2020). https://doi.org/10.1007/s11277-020-07449-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07449-1

Keywords

Navigation