Abstract
This paper presents a provably secure and efficient key agreement protocol (SNKE) using private key authentication. The distinguishing features of protocol SNKE are: (a) ease of implementation in the 802.15.4 stack (it makes use of the cryptographic services provided by the media access layer); (b) availability of two operation modes (hash-chain and key-renewal modes) with forward secrecy achieved (in key-renewal mode) with a modest computational effort.
In addition, the key distribution scheme, which may be either based on group keys or pairwise keys, combined with both operation modes offers effective levels of protection against long-term key compromise.
The protocol was designed to meet the strict power and energy constraints of lowrate wireless personal area networks (802.15.4 WPANs). Indeed, the foreseeable applications include the deployment of standard-compliant secure wireless sensor networks (WSNs).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. Basagni, K. Herrin, E. Rosti, and D. Bruschi. Secure Pebblenets. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 156–163, 2001.
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Advances in Cryptology - CRYPT0 1996, LNCS 1109:1–15, 1996.
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In 30th Symposium on Theory of Computing, pages 419–428, 1998.
M. Bellare and C. Nampempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Advances in Cryptology - Asiacrypt 2000, LNCS 1976, 2000.
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of CRYPTO 1993, LNCS 773:232–249, 1993.
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In 1st Conference on Computer and Communications Security, pages 62–73, 1993.
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. Advances in Cryptology - CRYPTO ’99, LNCS 1666:216–233, 1999.
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, S. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology - CRYPTO 1992, LNCS 740:471–486, 1993.
R. Canetti and H. Krawczyk. Analysis of key exchange protocols and their use for building secure channels. Advances in Cryptology-EUROCRYPT 2001, LNCS 2045:453–474, 2001.
R. Canetti and H. Krawczyk. Universally composable notions of key exchange and secure channels. Advances in Cryptology-EUROCRYPT 2002, LNCS 2332:337–351, 2002.
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 197–213, 2003.
J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag, 2002.
D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. Proceedings of the 23rd Annual Symposium on the Theory of Computing, 1991.
L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41–47, 2002.
S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computing and System Sciences, 28:270–299, 1984.
IEEE-802.15.4-2006. Standard for information technology-telecommunications and inofrmation exchange between systems-local and metropoolitan area networks-specific requirementspart 15.4: Wireless medium access control (mac) and physical layer (phy) specifications for low rate wireless personal area networks (wpann). Institute of Electrical and Electronics Engineers, 2006.
ISO/IEC-11770-2. Information technology-security techniques-key management-part 2: Mechanisms using symmetric techniques. International Standards Organization, 1996.
K. Jamshaid and L. Schwiebert. SEKEN (Secure and Efficient Key Exchange for Sensor Networks. Proceedings of IEEE Int.l Conference on Performance, Computing and Communications, pages 415–422, 2004.
P. Janson and G. Tsudik. Secure and Minimal Protocols for Authenticated Key Distribution. Computer communications, 18(9):645–653, 1995.
J. Kaps, K. Yuksel, and B. Sunar. Energy Scalable Universal Hashing. IEEE Transactions on Computers, pages 1484–1495, 2005.
H. Krawczyk. The energy cost of cryptographic key establishment in wireless sensor networks. http://eprint.iacr.org/2007/003, 2007.
D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM conference on Computer and communications security, pages 52–61, 2003.
S. Mauw, I. Van Vessen, and B. Bos. Forward Secure Communication in Wireless Sensor Networks. 3rd International Conference on Security in Pervasive Computing, 2006.
A. Menezes, P. V. Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
M. Ohkubo, K. Suzuki, and S. Kinoshita. Cryptographic Approach to “Privacy-Friendly” Tags. In RFID Privacy Workshop, 2003.
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Mobile Computing and Networking, 2001.
N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. Proceedings of Int.l Symposium on Low power electronics and Design, pages 30–35, 2003.
M. Satyanarayanan. Integrating Security in a Large Distributed System. ACM Transactions on Computer Systems, 7(3):247–280, 1989.
V. Shoup. On Formal Models for Secure Key Exchange. Technical Report RZ 3120, IBM Research, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Strangio, M.A. (2008). Establishing secure links in low-rate wireless personal area networks. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)