CFP last date
20 May 2024
Reseach Article

A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange

Published on December 2013 by T. D. Ilakkiya, C. Jayakumar, T. D. Shobana
International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
Foundation of Computer Science USA
ICIIIOES - Number 8
December 2013
Authors: T. D. Ilakkiya, C. Jayakumar, T. D. Shobana
0bddbf70-598f-4120-a096-47bf0687bc8d

T. D. Ilakkiya, C. Jayakumar, T. D. Shobana . A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange. International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences. ICIIIOES, 8 (December 2013), 34-38.

@article{
author = { T. D. Ilakkiya, C. Jayakumar, T. D. Shobana },
title = { A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange },
journal = { International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences },
issue_date = { December 2013 },
volume = { ICIIIOES },
number = { 8 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 34-38 },
numpages = 5,
url = { /proceedings/iciiioes/number8/14339-1638/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%A T. D. Ilakkiya
%A C. Jayakumar
%A T. D. Shobana
%T A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange
%J International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
%@ 0975-8887
%V ICIIIOES
%N 8
%P 34-38
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless Sensor Networks are often deployed in adverse or hostile environments so there is always a need for key management schemes for sensor nodes. The existing q-composite Random Key Predistribution (RKP) scheme is a probabilistic key management scheme where each node is preloaded with a subset of keys that are randomly selected from a pool of keys. If a pair of neighbor nodes which have at least q common keys can be used to establish a secure link between the nodes. In this paper, we enhanced the previous security analysis (i. e. , resilience against node capture) of the q-composite RKP scheme and we present a lightweight implementation of the Elliptic Curve Diffie-Hellman (ECDH) key exchange for wireless sensor nodes Elliptic Curve Diffie-Hellman (ECDH) key exchange which is feasible for resource-restricted sensor nodes. The proposed method ECDH key exchange in WSNs is offering perfect resilience to node capture, excellent scalability, and low memory as well as reducing communication over-head. ECDH is the highly computation-intensive nature of its underlying cryptographic operations, causing fast execution times and with low energy consumption. Our results show that a full ECDH key exchange between two different nodes consumes a normal energy (including radio communication), which is significantly better for high secure environment reported ECDH implementations on comparable platforms.

References
  1. M. A. Simpl?cio, P. S. L. M. Barreto, C. B. Margi, and T. M. B. Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks vol. 54, no. 15, pp. 2591– 2612, 2010.
  2. L. Eschenauer and V. D. Gligor, "A key-management scheme for dis-tributed sensor networks," in Proc. 2002 ACMConference on Computer and Communications Security, pp. 41–47.
  3. H. Chan, A. Perrig, and D. X. Song, "Random key pre-distribution schemes for sensor networks," in Proc. 2003 IEEE Symposium on Security and Privacy, pp. 197–213.
  4. S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in adhoc networks: a probabilistic approach," in Proc. 2003 IEEE International Conference on Network Protocols, pp. 326–335.
  5. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway,"A survey of key management schemes in wireless sensor networks,"ComputerCommunications. ,vol. 30,no. 11-12,pp. 2314–2341, 2007.
  6. P. Bose, H. Guo, E. Kranakis, A. Maheshwari, P. Morin, J. Morrison, M. H. M. Smid, and Y. Tang, "On the false-positive rate of Bloom filters," Inf. Processing Letters. , vol. 108, no. 4, pp. 210–213, 2008.
  7. K. J. Christensen, A. Roginsky, and M. Jimeno, "A new analysis of the false positive rate of a Bloom filter," Inf. Processing Letters vol. 110, no. 21, pp. 944–949, 2010. [8 "Diffie- Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups," Ayan Mahalanobis, Florida, August 2005.
  8. ECC over RSA for Asymmetric Encryption: A Review, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Security Key Management Random Key Pre-distribution Resilience