Analysis of Public-Key Cryptography for Wireless Sensor Networks Security

With the widespread growth of applications of Wireless Sensor Networks (WSNs), the need for reliable security mechanisms these networks has increased manifold. Many security solutions have been proposed in the domain of WSN so far. These solutions are usually based on well-known cryptographic algorithms. In this paper, we have made an effort to survey well known security issues in WSNs and study the behavior of WSN nodes that perform public key cryptographic operations. We evaluate time and power consumption of public key cryptography algorithm for signature and key management by simulation.




References:
[1] D. Djenouri, L. Khelladi, "A Survey of Security Issues in Mobile Ad
Hoc and Sensor Networks," IEEE Communication Surveys and
Tutorials, vol. 7, no. 4, pp. 2-28, December 2005.
[2] G. Gaubatz, J-P. Kaps, B. Sunar, "Public Key Cryptography in Sensor
Networks Revisited", 1st European Workshop on Security in Ad-Hoc
and Sensor Networks (ESAS 2004), Lecture Notes in Computer
Science, vol. 3313, Springer, Heidelberg, pp. 2-18, August, 2004.
[3] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, "SPINS:
Security Protocols for Sensor Networks," Wireless Networks, vol. 8,
no. 5, pp. 521-534, September 2002.
[4] A. Baggio, "Wireless sensor networks in precision agriculture", in
ACM Workshop on Real-World Wireless Sensor Networks
(REALWSN 2005), Stockholm, Sweden, June 2005.
[5] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, J. Anderson,
"Wireless Sensor Networks for Habitat Monitoring", in First ACM
Workshop on Wireless Sensor Networks and Applications, Atlanta,
GA, USA, September 2002.
[6] G. Fuchs, S. Truchat, F. Dressler, "Distributed Software Management
in Sensor Networks using Profiling Techniques", in 1st IEEE/ACM
International Conference on Communication System Software and
Middleware (IEEE COMSWARE 2006): 1st International Workshop
on Software for Sensor Networks (SensorWare 2006), New Dehli,
India, January 2006.
[7] W. Zhang, G. Cao, "Group Rekeying for Filtering False Data in
Sensor Networks: A Predistribution and Local Collaboration-Based
Approach", in 24th IEEE Annual Joint Conference of the IEEE
Computer and Communications Societies (IEEE INFOCOM 2005),
pp. 503-514, March 2005.
[8] K. Piotrowski, P. Langendoerfer, S. Peter, "How Public Key
Cryptography Influences Wireless Sensor Node Lifetime",
Proceedings of the fourth ACM workshop on Security of ad hoc and
sensor networks, USA, pp.169 - 176, 2006
[9] Y. W. Law, "Key Management and Link-Layer Security of WSN",
Ph.D. Thesis, University of Twente, Netherland, 2005.
[10] A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D..Tygar. "SPINS:
Security Protocols for Sensor Networks," in Proceedings of the 7th
Annual ACM/IEEE International Conference on Mobile Computing
and Networking (MobiCom), Rome, Italy, pp. 189-199, July 2001..
[11] S. Zhu, S. Setia, S. Jajodia. "LEAP: Efficient Security Mechanisms
for Large-Scale Distributed Sensor Networks", In the Proceedings of
the 10th ACM conference on Computer and communications security,
2003.
[12] J. P. Walters, Zh. Liang, W. Shi, V. Chaudhary, "Security in
Distributed, Grid, and Pervasive Computing", Chapter 17, CRC Press,
2006.
[13] R. B. Ghazali, "Security in WSN in Enhance AODV Routing",
Masters thesis, Faculty of Electrical Engineering, University
Technology Malaysia, 2006.
[14] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of
Computation, Vol. 48, 1987.
[15] V.S. Miller, "Use of Elliptic Curves in Cryptography", Advances in
Cryptology CRYPTO 85, 1986.
[16] A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, "Handbook of
Applied Cryptography", CRC Press, 1996.
[17] W. Du, J. Deng, Y. S. Han, Shigang Chen, P.K. Varshney, "A Key
Management Scheme for Wireless Sensor Networks Using
Deployment Knowledge", IEEE INFOCOM 2004.
[18] B. C. Neuman, T. Tso, "Kerberos: An authentication service for
computer networks", IEEE Communications, vol. 32, no. 9, pp. 33-38,
September 1994.
[19] W. Diffie, M. E. Hellman, "New directions in cryptography", IEEE
Transactions on Information Theory, vol. 22, pp. 644-654, November
1976.
[20] R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining
digital signatures and public-key cryptosystems", Communications of
the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[21] A. S. Wander, N. Gura, H. Eberle, V. Gupta, Sh. Ch. Shantz,
"Energy analysis of public-key cryptography for wireless sensor
networks", In PERCOM -05: Proceedings of the Third IEEE
International Conference on Pervasive Computing and
Communications, pp. 324-328, Washington, DC, USA, 2005. IEEE
Computer Society.
[22] ATmega128(L) Data Sheet (2006). Atmel Corporation, Available at:
http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf