Abstract
In this paper, we present our implementation of a stateful public key encryption (stateful PKE) scheme in the wireless sensor network (WSN) environment. In order to reduce the communication overhead of the stateful PKE scheme we implement, which is of prime importance in WSN, we introduce a technique called “indexing”. The performance analysis of our implementation shows that there are significant advantages of using stateful PKE in WSN in terms of computation and communication costs, compared with normal public key encryption.
Chapter PDF
Similar content being viewed by others
Keywords
- Sensor Node
- Wireless Sensor Network
- Elliptic Curve Cryptography
- Challenge Ciphertext
- Choose Ciphertext Attack
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Abdalla, M. Bellare and P. Rogaway, The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, In CT-RSA ’01, LNCS 2020, pp. 143–158, Springer-Verlag, 2001.
M. Bellare, Practice-Oriented Provable-Security, Lectures on Data Security – Modern Cryptology in Theory and Practice, LNCS 1561, pp. 1–15, Springer-Verlag 1999.
M. Bellare, R. Canetti and H. Krawczyk, Keying Hash Functions for Message Authentication, In Crypto ’96, LNCS 1109, pp. 1–15, Springer-Verlag, 1996.
M. Bellare, T. Kohno and V. Shoup, Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation, In ACM-CCS 2006, pp. 380–389, 2006.
M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations Among Notions of Security for Public-Key Encryption Schemes, In Crypto ’98, LNCS 1462, pp. 26–45, Springer-Verlag, 1998.
M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM-CCS ’93, pp. 62–73, ACM, 1993.
R. Cramer and V. Shoup, Design and Analysis of Practical Public-key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal of Computing 33, pp. 167–226, 2003.
MicaZ Wireless Sensor Network Platform, Crossbow Technology, http://www.xbow.com/
G. Gaubatz, J.-P. Kaps and B. Sunar, Public Key Cryptography in Sensor Networks Revisited, In EuropeanWorkshop on Security in Ad-Hoc and Sensor Networks 2004 (ESAS ’04), LNCS 3313, pp. 2–18, Springer-Verlag, 2005.
G. Gaubatz, J.-P. Kaps, E. Oztruk and B. Sunar, State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks, In IEEE International Workshop on Pervasive Computing and Communication Security 2005 (PerSec ’05), 2005.
J. Hoffstein, J. Pipher, J. Silverman, NTRU: A Ring-Based Public Key Cryptosystem. In Algorithmic Number Theory (ANTS III), LNCS 1423, pp. 267–288, Springer-Verlag, 1998.
ISO 18033-2, An Emerging Standard for Public-Key Encryption, Working Group 2 of ISO/IEC JTC 1/SC27, 2004.
N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation 48, pp. 203–209, 1987.
V. Miller, Use of Elliptic Curves in Cryptography, In Crypto ’85, LNCS 218, pp. 417–426, Springer-Verlag, 1986.
R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public- Key Cryptosystems, Communications of the ACM 21 (2), pp. 120–126, 1978.
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: Security Protocols for Sensor Networks. Wireless Networks 8 (2002), pp. 521–534, 2002.
M.O. Rabin, Digitalized signatures and Public Key Functions as Intractable as Factorization. Mit/lcs/tr-212, Massachusetts Institute of Technology, 1979.
TinyECC, http://discovery.csc.ncsu.edu/software/TinyECC/
TinyOS, http://www.tinyos.net/
A. Wander, N. Gura, H. Eberle, V. Gupta and S Shantz, Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, In IEEE International Conference on Pervasive Computing and Communication 2005 (PerCom ’05), pp. 324–328, IEEE Computer Society, 2005.
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn and P. Kruus, TinyPK: securing sensor networks with public key technology, In ACM workshop on Security of ad hoc and sensor networks 2004 (SASN ’04), pp. 59–64. ACM Press, 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Baek, J., Tan, H.C., Zhou, J., Wong, J.W. (2008). Realizing Stateful Public Key Encryption in Wireless Sensor Network. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)