8th International Conference on Communications and Networking in China

Research Article

Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks

  • @INPROCEEDINGS{10.1109/ChinaCom.2013.6694650,
        author={Lijun Yang and Chao Ding and Meng Wu},
        title={Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks},
        proceedings={8th International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2013},
        month={11},
        keywords={sensor networks security key agreement identity-based cryptography elliptic curve cryptography efficient implementation},
        doi={10.1109/ChinaCom.2013.6694650}
    }
    
  • Lijun Yang
    Chao Ding
    Meng Wu
    Year: 2013
    Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks
    CHINACOM
    IEEE
    DOI: 10.1109/ChinaCom.2013.6694650
Lijun Yang1, Chao Ding2, Meng Wu2,*
  • 1: Nanjing University of Posts and Telecommunications
  • 2: Nanjing University of Posts and Telecommunicaitons
*Contact email: wum@njupt.edu.cn

Abstract

In this paper, we propose a novel authenticated key agreement scheme using Pairing-based Cryptography, named IBAKA, to address the problems of high memory occupation, low key connectivity and poor resiliency against node capture attacks existed in the traditional key management protocols of large scale sensor networks. Our proposal, which works based on the elliptic curve Diffie-Hellman (ECDH) exchange and identity-based cryptography, can effectively resist man-in-the-middle attacks and node-capture attacks through encrypting the exchanged parameters using identity-based encryption. Theoretical analysis indicates that compare with the typical random key pre-distribution approaches; IBAKA achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying. Furthermore, we implement IBAKA for TinyOS-2.1 based on the MICA2 motes. The experiment results demonstrate that IBAKA is feasible for infrequent key distribution and rekeying in large scale sensor networks.