Skip to main content

Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network

  • Chapter
Transactions on Computational Science XI

Abstract

Wireless sensor networks (WSN) consists of sensor nodes with limited energy, processing, communication and memory. Security in WSN is becoming critical with the emergence of applications that require mechanisms for authenticity, integrity and confidentiality. Due to resource constraints in WSN, matching public key cryptosystems (PKC) for these networks is an open research problem. Recently a new PKC based on quasigroups multivariate quadratic. Experiments performed show that MQQ performed in less time than existing major PKC, so that some articles claim that has MQQ speed of a typical symmetric block cipher. Considering features promising to take a new path in the difficult task of providing wireless sensor networks in public key cryptosystems. This paper implements in nesC a new class of public key algorithm called Multivariate Quadratic Quasigroup. This implementation focuses on modules for encryption and decryption of 160-bit MQQ, the modules have been implemented on platforms TelosB and MICAz. We measured execution time and space occupied in the ROM and RAM of the sensors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahlawat, R., Gupta, K., Pal, S.K.: From mq to mqq cryptography: Weaknesses new solutions. In: Western European Workshop on Research in Cryptology (2009)

    Google Scholar 

  2. Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized public-key engines: Mq-cryptosystems as replacement for elliptic curves? Cryptology ePrint Archive, Report 2008/349 (2008), http://eprint.iacr.org/

  3. CERTICOM. Securing sensor networks - getting it right from the start, with public-key (2006), http://certicomcenterofexcellence.com/pdf/white_paper_sensor_networks_login.pdf

  4. Gay, D., Sharp, C., Turon, M.: Timers (2007), http://www.tinyos.net/tinyos-2.x/doc/html/tep102.html .

  5. Inc CrossBow Technology. Micaz wireless measurement system (2008), http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf

  6. Inc CrossBow Technology. Telosb mote platform (2008), http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/TelosB_Datasheet.pdf

  7. El-Hadedy, M., Gligoroski, D., Knapskog, S.J.: High performance implementation of a public key block cipher - mqq, for fpga platforms. In: RECONFIG 2008: Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs, Washington, DC, USA, pp. 427–432. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  8. Gaubatz, G., Kaps, J.P., Öztürk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2005), Kauai Island, pp. 146–150 (2005)

    Google Scholar 

  9. Gligoroski, D., Markovski, S., Knapskog, S.J.: Public key block cipher based on multivariate quadratic quasigroups. Cryptology ePrint Archive, Report 2008/320 (2008), http://eprint.iacr.org/

  10. Gligoroski, D., Markovski, S., Knapskog, S.J.: Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups. In: MATH 2008: Proceedings of the American Conference on Applied Mathematics, Stevens Point, Wisconsin, USA, pp. 44–49. World Scientific and Engineering Academy and Society (WSEAS) (2008)

    Google Scholar 

  11. Perret, L., Gligoroski, D., Faugère, J.-C., Odegard, R.: Analysis of the mqq public key cryptosystem. In: The Ninth International Conference on Cryptology And Network Security (CANS 2010), Kuala Lumpur (Malaysia). LNCS, Springer, Heidelberg (2010)

    Google Scholar 

  12. Levis, P.: Tossim: Accurate and scalable simulation of entire tinyos applications. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys) (2003), http://csl.stanford.edu/~pal/pubs/tinyos-programming.pdf

  13. Levis, P.: Tinyos programming. TinyOS Programming (2006), http://csl.stanford.edu/~pal/pubs/tinyos-programming.pdf

  14. Levis, P., Lee, N.: Tossim: A simulator for tinyos networks. TOSSIM: A Simulator for TinyOS Networks (2003), http://www.eecs.berkeley.edu/~pal/pubs/nido.pdf

  15. Liu, D., Ning, P.: Security for Wireless Sensor Networks. Springer, Heidelberg (2007)

    Google Scholar 

  16. Lopez, J., Roman, R., Alcaraz, C.: Analysis of security threats, requirements, technologies and standards in wireless sensor networks, pp. 289–338 (2009)

    Google Scholar 

  17. Mohamed, M.S., Ding, J., Buchmann, J., Werner, F.: Algebraic attack on the mqq public key cryptosystem. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 392–401. Springer, Heidelberg (2009)

    Google Scholar 

  18. Oliveira, L.B., Scott, M., López, J., Dahab, R.: TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: 5th International Conference on Networked Sensing Systems (INSS 2008), Kanazawa/Japan (2008) (to appear)

    Google Scholar 

  19. Pal, S.K., Sumitra.: Development of efficient algorithms for quasigroup generation encryption. In: Proc. IEEE International Advance Computing Conference IACC 2009, March 6–7, pp. 940–945 (2009)

    Google Scholar 

  20. Palafox, L.E., Garcia-Macias, J.A.: XXXIV - Security in Wireless Sensor Networks. In: Handbook of Research on Wireless Security (2008)

    Google Scholar 

  21. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Maia, R.J.M., Barreto, P.S.L.M., de Oliveira, B.T. (2010). Implementation of Multivariate Quadratic Quasigroup for Wireless Sensor Network. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science XI. Lecture Notes in Computer Science, vol 6480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17697-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17697-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17696-8

  • Online ISBN: 978-3-642-17697-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics