Professional Documents
Culture Documents
A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme For Heterogeneous Wireless Sensor Networks
A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme For Heterogeneous Wireless Sensor Networks
A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme For Heterogeneous Wireless Sensor Networks
2,3
Arab Academy of Science & Technology and Maritime Transport (AAST ), Fac., of Eng, Cairo, Egypt
message by using H’s public key and get the tree structure. If two The L-sensor u sends the cipher text ( C , R , S ) to c-neighbour v;
L-sensors are parent and child in the routing tree, then they are the c -neighbour v unsigncrypt the message m as follows:
c-neighbour of each other, and they will setup a shared key by 1. k1 = hash ( S ( R + PLu ) (51)
themselves to start secure communication between them. 2. r = hash (C , K1 ) (52)
3. k 2 = hash (vLv S ( R + PLu ) (53)
1) Location Message Signcryption 4. m = Dk 2 (C ) (54)
This step is responsible for signcrypting the 5. Accept C only if Gr = R (55)
location messages sending by each L-sensor
to H-sensor. Then H unsigncrypt this IV. Performance Evaluation and Security Analysis
messages and determines the tree structure.
Each L-sensor signcrypts location message with its private key A. Performance evaluation
VL as follows: In this section, the performance results for the proposed FS-
1. Each L-sensor chose a random vi ∈ [1,, q − 1] , Where ECSKM scheme has been discussed and compared with two
i = [1, , n] , n: is the number of L-sensors. schemes; ECC-based key management scheme given in [1] and
2. ki ,1 = hash (vi G ) (23) ECS key management scheme given in [2] in terms of the storage
3. ki , 2 = hash (vi PH ) (24) requirement and energy consumption. It is shown that the proposed
4. Ci = Ek i , 2 (m) (25) FS-ECSKM has the same performance compared with [2], but the
5. ri = hash (Ci , K i ,1 ) (26) proposed FS-ECSKM has an addition secure property, forward
6. Si = vi (ri + VLi ) mod q (27) secrecy, public verification, and encrypted message authentication.
7. Ri = ri G (28) The proposed FS-ECSKM scheme achieved better security with
Each L-sensor sends the cipher text ( Ci , Ri , Si ) to H-sensor; significant reductions on communication overhead, storage space,
H-sensor unsigncrypts the message as follows: and energy consumption compared with [1]. Also, the proposed
1. ki ,1 = hash ( S i ( Ri + PLi ) (29) FS-ECSKM scheme has an addition secure property such as
2. ri = hash (Ci , K i ,1 ) (30) forward secrecy, public verification, and encrypted message
3. ki , 2 = hash (vH S i ( Ri + PLi ) (31) authentication over the scheme given in [1].
4. m = Dk i , 2 (C i ) (32)
5. Accept Ci only if ri G = R i (33) 1. Significant Storage Saving
Assume that the number of H-sensors and L-sensors in an HWSN
2) Broadcasting Message Signcryption is M and N, respectively. Typically we have M << N. In the
This step is responsible for signcrypting the Centralized EC signcryption key management scheme, each
broadcasting message from H-sensor to L-sensors authenticate L-sensor is pre-loaded with its private key and the public key
the routing structure information. H sensor signcrypts the tree of H-sensors. Each H-sensor is pre-loaded with public keys of
structure and disseminates it to each L-sensor. all L-sensors, plus a pair of private/public key for itself. Thus an
1. H-sensor (CH) chose a random vi ∈ [1,, q − 1] , Where, H-sensor is pre-loaded with N+2 keys. Using EC compression
i = [1,, n] , n: number of L sensors point property in order to reduce the storage space, Hence, the
2. ki ,1 = hash (vi G ) (34) total number of pre-loaded keys is:
3. ki , 2 = hash (vi PLi ) (35) M M
× ( N + 2) + 2 × N = ( + 2) N + M
4. Ci = Ek i , 2 (m) (36) 2 2 (56)
5. ri = hash (Ci , K i ,1 ) (37) In the distributed EC signcryption key management scheme, each
6. S i = vi (ri + VH ) mod q (38) L-sensor is pre-loaded with its public/private key pair and the
7. Ri = ri G (39) public key of H-sensors. Each H-sensor is pre-loaded with public/
H-sensor sends the cipher text ( Ci , Ri , Si ) to each L-sensor; private key pair and the public key of all L-sensors; also we use EC
L-sensor unsigncrypts the message as follows: point compression. Thus the total number of pre-loaded keys is:
1. ki ,1 = hash ( S i ( Ri + PH ) (40) M M
× ( N + 2) + 3 × N = ( + 3) N + M
2. ri = hash (Ci , K i ,1 ) (41) 2 2 (57)
3. ki , 2 = hash (vLi S i ( Ri + PH ) (42) In the ECC-based key management scheme [1], the total number
4. m = Dk i , 2 (C i ) (43) of pre-loaded keys in the Centralized ECC-based key management
5. Accept Ci only if ri G = R i (44) scheme is given by:
M × ( N + 3) + 2 × N = ( M + 2) N + 3M (58)
3) The message between L-sensors Signcryption The total number of pre-loaded keys in the Distributed ECC-based
This step is responsible for signcrypting the messages between key management scheme is given by:
each L-sensor and its c-neighbour to start secure communication M × ( N + 3) + 3 × N = ( M + 3) N + 3M (60)
between them.
L-sensor u: send its public key PLν to its c-neighbor.
c -neighbor v: send its public key PLν to L-sensor u.
L-sensor u: Signcrypt the message m with its private key VL .
1. The L-sensor u chose a random v ∈ [1, , q − 1] .
2. k1 = hash(vG ) (45)
3. k 2 = hash (v PLv ) (46)
4. C = E k 2 ( m) (47)
5. r = hash (C , K1 ) (48)
6. S = v (r + VLu ) mod q (49)
7. R = Gr
rG (50)
w w w. i j c s t. c o m International Journal of Computer Science and Technology 21
IJCST Vol. 2, Issue 2, June 2011 ISSN : 2229-4333(Print) | ISSN : 0976-8491(Online)
V. Conclusions
Fig. 3: Comparison with Distributed scheme given in [1] This paper presents an efficient Forward Secure Elliptic Curve
Signcryption Key Management (FS-ECSKM) Scheme for
In Fig. 2 and 3, the total number of pre-loaded keys for different Heterogeneous Wireless Sensor Networks (HWSN) has been
sizes of sensor networks has been plotted for both centralized and proposed. An improved signcryption scheme that achieves the
distributed key establishment schemes. We can observe from Fig. 2 highly desired features in cluster sensor networks has been
that the proposed scheme requires much less storage space for pre- proposed. It utilizes elliptic curves for their high security and
loaded keys than that introduced in [1]. The results show that the small key size. In addition, the new scheme achieves forward
proposed scheme provides better security than other schemes by secrecy, public verifiability and encrypted message authentication.
offering the public verifiability and forward secrecy properties. The scheme’s forward secrecy property ensures that past
messages remain confidential even if the sender’s private key is
B. Total Energy Consumption compromised. Public verifiability enables any trusted/un-trusted
Since the energy required transmitting 1 byte is 1.56µ Joule, so judge when dispute occurs to verify the signature of original
we can calculate the energy consumption for H-sensors. From message without revealing any secret information. Also, the
the description of our protocol in the centralized scheme, we find performance evaluation shows that this key management scheme
that each H-sensor needs 56 bytes to send the routing structure can achieve significant reduction in storage space compared with
information to each L-sensor, so the energy consumed can be other previous schemes.
computed as; Energy consumed per H-sensor = 56 * 1.56 =
87.36 µ Joule. It is the same value obtained when calculating References
the energy consumption in [1]. So, there is no saving in the [1] Xiaojiang Du, Member, IEEE, Mohsen Guizani, Fellow,
energy consumption for this comparison but it is acceptable by IEEE, Yang Xiao, Senior Member IEEE, and Hsiao-Hwa
achieving an addition secure property such as forward secrecy, Chen, Senior Member, IEEE. “A Routing-Driven Elliptic
public verification, and encrypted message authentication over Curve Cryptography Based Key Management Scheme for
the scheme given in [1]. Heterogeneous Sensor Networks” vol. 8, March 2009.
[2] Esam A. A. A. Hagras, Hazem H. Aly, Doaa El-Saied “An
C. Security analysis Efficient Key Management Scheme based on Elliptic Curve
The security properties of the proposed scheme are described as Signcryption for Heterogeneous Wireless Sensor Networks”.
follows [4]: IJCST Vol. 1, Issue 2, December 2010.
1. Unforgeability: It is computationally infeasible to forge a [3] Y. Zheng, Digital Signcryption or how to achieve cost (signature
valid signcrypted text ( C , R , S ) and claim that it is coming and encryption)ii cost(signature) + cost(encryption)”, In
from the sender without having sender’s private key. Advances in Cryptography – CRYPTO’97,LNCS 1294,
22 International Journal of Computer Science and Technology w w w. i j c s t. c o m
ISSN : 2229-4333(Print) | ISSN : 0976-8491(Online) IJCST Vol. 2, Issue 2, June 2011