Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks

Authors

DOI:

https://doi.org/10.26636/jtit.2024.1.1389

Keywords:

authenticated key exchange, key agreement, secure protocol, STAKE, wireless sensor network

Abstract

The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.

Downloads

Download data is not yet available.

References

W. Diffie and M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.

L. Harn, M. Mehta, and W.-J. Hsin, "Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA)", IEEE Communications Letters, vol. 8, no. 3, pp. 198-200, 2004.

A.C.-C. Yao and Y. Zhao, "Privacy-preserving Authenticated Key-exchange over Internet", IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 125-140, 2014.

T. Yi, M. Shi, and W. Shang, "Personalized Two Party Key Exchange Protocol", in: 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), Las Vegas, USA, pp. 575-579, 2015.

A.S. Rawat and M. Deshmukh, "Efficient Extended Diffie-Hellman Key Exchange Protocol", in: 2019 International Conference on Computing, Power and Communication Technologies (GUCON), New Delhi, India, pp. 447-451, IEEE, 2019 (https://ieeexplore.ieee.org/document/8940607).

Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, "Fast Authenticated Key Establishment Protocols for Self-organizing Sensor Networks", in: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, San Diego, USA, pp. 141-150, 2003.

X. Tian, D.S. Wong, and R.W. Zhu, "Analysis and Improvement of an Authenticated Key Exchange Protocol for Sensor Networks", IEEE Communications Letters, vol. 9, no. 11, pp. 970-972, 2005.

P.G. Chilveri and M.S. Nagmode, "A Novel Node Authentication Protocol Connected with ECC for Heterogeneous Network", Wireless Networks, vol. 26, pp. 4999-5012, 2020.

L. Deng and R. Gao, "Certificateless Two-party Authenticated Key Agreement Scheme for Smart Grid", Information Sciences, vol. 543, pp. 143-156, 2021.

Z. Li, Z. Yang, P. Szalachowski, and J. Zhou, "Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things", IEEE Internet of Things Journal, vol. 8, no. 2, pp. 844-859, 2021.

M. Qi and J. Chen, "Secure Authenticated Key Exchange for WSNs in IoT Applications", The Journal of Supercomputing, vol. 65, no. 3, pp. 1-14, 2021. -0.1pt

J. Srinivas, A.K. Das, X. Li, M.K. Khan, and M. Jo, "Designing Anonymous Signature-based Authenticated Key Exchange Scheme for Internet of Things-enabled Smart Grid Systems", IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 4425-4436, 2021.

C. Patel and N. Doshi, "Secure Lightweight Key Exchange Using ECC for User-gateway Paradigm", IEEE Transactions on Computers, vol. 70, no. 11, pp. 1789-1803, 2021.

A.K. Das, M. Wazid, A.R. Yannam, J.J.P. Rodrigues, and Y. Park, "Provably Secure ECC-based Device Access Control and Key Agreement Protocol for IoT Environment", IEEE Access, vol. 7, pp. 55382-55397, 2019.

T.-Y. Wu et al., "An Authenticated Key Exchange Protocol for Multi-server Architecture in 5G Networks", IEEE Access, vol. 8, pp. 28096-28108, 2020.

F. Wei, P. Vijayakumar, Q. Jiang, and R. Zhang, "A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks", IEEE Transactions on Sustainable Computing, vol. 5, no. 2, pp. 268-278, 2020.

K. Ok, V. Coskun, C. Cevikbas, and B. Ozdenizci, "Design of a Key Exchange Protocol Between SIM Card and Service Provider", in: 2015 23rd Telecommunications Forum (TELFOR), pp. 281-284, IEEE, 2015.

C. Thammarat and C. Techapanupreeda, "A Secure Authentication and Key Exchange Protocol for M2M Communication", in: 2021 9th International Electrical Engineering Congress (IEECON), Pattaya, Thailand, pp. 456-459, 2021.

H. Tan et al., "A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks", IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9570-9584, 2016.

L. Xiaoyong and Z. Hui, "Identity-based Authenticated Key Exchange Protocols", in: 2010 International Conference on Educational and Information Technology, Chongqing, China, vol. 3, pp. 85-87, 2010.

E.-H. Lu, W.-T. Ko, and H.K.-C. Chang, "A Novel ECC Protocol for Key Exchanging in Non-PKI Networks", in: Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Harbin, China, vol. 1, pp. 822-825, 2011.

S. Jarecki, M. Jubur, H. Krawczyk, N. Saxena, and M. Shirvanian, "Two-factor Password-authenticated Key Exchange with End-to-end Security", ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 3, pp. 1-37, 2021.

A. Abusukhon, Z. Mohammad, and A. Al-Thaher, "Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models", in: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, pp. 73-78, 2019.

C. Cremers, Scyther: Semantics and Verification of Security Protocols, PhD thesis, Mathematics and Computer Science, Eindhoven University of Technology, 2006.

C. Cremers, "The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols", Lecture Notes in Computer Science, vol. 5123, pp. 414-418, Springer, 2008.

G. Lowe, "A Hierarchy of Authentication Specifications", in: Proceedings 10th Computer Security Foundations Workshop, Rockport, USA, pp. 31-43, 1997.

C. Cremers and S. Mauw, Operational Semantics and Verification of Security Protocols, Springer-Verlag, 188 p., 2012 (ISBN: 9783540786351).

L. Dong and K. Chen, Cryptographic Protocol. Security Analysis Based on Trusted Freshness, Springer-Verlag, 384 p., 2012 (ISBN: 9783642240720).

National Institute of Standards and Technology (NIST), "Digital Signature Standard (DSS)", Federal Information Processing Standards Publication, FIPS PUB 186-4, 2013.

Downloads

Published

2024-01-18 — Updated on 2024-03-26

How to Cite

Chmielowiec, A., Klich, L., & Woś, W. (2024). Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks. Journal of Telecommunications and Information Technology, 1(1), 1–10. https://doi.org/10.26636/jtit.2024.1.1389

Issue

Section

ARTICLES FROM THIS ISSUE

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.