About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile Networks and Management. 12th EAI International Conference, MONAMI 2022, Virtual Event, October 29-31, 2022, Proceedings

Research Article

Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-32443-7_22,
        author={Chengqi Hou and Wei Yang and Zhiming Zhang and Qinghua Liu and Jianmao Xiao},
        title={Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms},
        proceedings={Mobile Networks and Management. 12th EAI International Conference, MONAMI 2022, Virtual Event, October 29-31, 2022, Proceedings},
        proceedings_a={MONAMI},
        year={2023},
        month={5},
        keywords={6TiSCH Protocol Security Communication ECC Algorithm AES Algorithm},
        doi={10.1007/978-3-031-32443-7_22}
    }
    
  • Chengqi Hou
    Wei Yang
    Zhiming Zhang
    Qinghua Liu
    Jianmao Xiao
    Year: 2023
    Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms
    MONAMI
    Springer
    DOI: 10.1007/978-3-031-32443-7_22
Chengqi Hou1, Wei Yang1,*, Zhiming Zhang1, Qinghua Liu1, Jianmao Xiao1
  • 1: School of Software
*Contact email: yw@jxnu.edu.cn

Abstract

The 6TiSCH protocol stack has been widely utilized in the industry to build highly reliable and energy efficiency wireless sensor networks (WSNs). The communication security between nodes mainly relies on the AES encryption algorithm, but the 6TiSCH protocol does not regulate the protection strategy for encryption keys in the network. Therefore, this paper proposes a hybrid ECC-AES data encryption scheme based on the 6TiSCH protocol stack. The Elliptic Curve Diffie Hellman (ECDH), Elliptic Curve Qu-Vanstone (ECQV) algorithms are used to negotiate the shared key for each two nodes in a WSN, and AES encryption with dynamic session keys are derived from the shared key during the nodes’ communication phase. Meanwhile, since the ECC algorithm is used in the resource-constrained nodes, this paper considers the influence of the underlying elliptic curve operations on the computation speed of the shared key, and proposes a regular window algorithm to accelerate the scalar multiplication operation based on previous researches. To prove the scheme’s viability, we conduct simulation experiments on the generation time of shared keys, and the experimental results prove that the encryption scheme under the regular window scalar multiplication has an impressive key generation speed.

Keywords
6TiSCH Protocol Security Communication ECC Algorithm AES Algorithm
Published
2023-05-28
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-32443-7_22
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL