Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks

Authors

DOI:

https://doi.org/10.26636/jtit.2024.1.1389

Keywords:

authenticated key exchange, key agreement, secure protocol, STAKE, wireless sensor network

Abstract

The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem is computationally challenging. In addition to the formal description, the authors provide the results of an investigation concerned with the protocol's security properties, conducted by verifying the model using Scyther software. The publication also includes an analysis of the protocol's energy consumption, performed with the use of hardware platforms with ARM microcontrollers.

Downloads

Download data is not yet available.

References

W. Diffie and M. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
View in Google Scholar

L. Harn, M. Mehta, and W.-J. Hsin, "Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm (DSA)", IEEE Communications Letters, vol. 8, no. 3, pp. 198-200, 2004.
View in Google Scholar

A.C.-C. Yao and Y. Zhao, "Privacy-preserving Authenticated Key-exchange over Internet", IEEE Transactions on Information Forensics and Security, vol. 9, no. 1, pp. 125-140, 2014.
View in Google Scholar

T. Yi, M. Shi, and W. Shang, "Personalized Two Party Key Exchange Protocol", in: 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS), Las Vegas, USA, pp. 575-579, 2015.
View in Google Scholar

A.S. Rawat and M. Deshmukh, "Efficient Extended Diffie-Hellman Key Exchange Protocol", in: 2019 International Conference on Computing, Power and Communication Technologies (GUCON), New Delhi, India, pp. 447-451, IEEE, 2019 (https://ieeexplore.ieee.org/document/8940607).
View in Google Scholar

Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang, "Fast Authenticated Key Establishment Protocols for Self-organizing Sensor Networks", in: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, San Diego, USA, pp. 141-150, 2003.
View in Google Scholar

X. Tian, D.S. Wong, and R.W. Zhu, "Analysis and Improvement of an Authenticated Key Exchange Protocol for Sensor Networks", IEEE Communications Letters, vol. 9, no. 11, pp. 970-972, 2005.
View in Google Scholar

P.G. Chilveri and M.S. Nagmode, "A Novel Node Authentication Protocol Connected with ECC for Heterogeneous Network", Wireless Networks, vol. 26, pp. 4999-5012, 2020.
View in Google Scholar

L. Deng and R. Gao, "Certificateless Two-party Authenticated Key Agreement Scheme for Smart Grid", Information Sciences, vol. 543, pp. 143-156, 2021.
View in Google Scholar

Z. Li, Z. Yang, P. Szalachowski, and J. Zhou, "Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things", IEEE Internet of Things Journal, vol. 8, no. 2, pp. 844-859, 2021.
View in Google Scholar

M. Qi and J. Chen, "Secure Authenticated Key Exchange for WSNs in IoT Applications", The Journal of Supercomputing, vol. 65, no. 3, pp. 1-14, 2021. -0.1pt
View in Google Scholar

J. Srinivas, A.K. Das, X. Li, M.K. Khan, and M. Jo, "Designing Anonymous Signature-based Authenticated Key Exchange Scheme for Internet of Things-enabled Smart Grid Systems", IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 4425-4436, 2021.
View in Google Scholar

C. Patel and N. Doshi, "Secure Lightweight Key Exchange Using ECC for User-gateway Paradigm", IEEE Transactions on Computers, vol. 70, no. 11, pp. 1789-1803, 2021.
View in Google Scholar

A.K. Das, M. Wazid, A.R. Yannam, J.J.P. Rodrigues, and Y. Park, "Provably Secure ECC-based Device Access Control and Key Agreement Protocol for IoT Environment", IEEE Access, vol. 7, pp. 55382-55397, 2019.
View in Google Scholar

T.-Y. Wu et al., "An Authenticated Key Exchange Protocol for Multi-server Architecture in 5G Networks", IEEE Access, vol. 8, pp. 28096-28108, 2020.
View in Google Scholar

F. Wei, P. Vijayakumar, Q. Jiang, and R. Zhang, "A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks", IEEE Transactions on Sustainable Computing, vol. 5, no. 2, pp. 268-278, 2020.
View in Google Scholar

K. Ok, V. Coskun, C. Cevikbas, and B. Ozdenizci, "Design of a Key Exchange Protocol Between SIM Card and Service Provider", in: 2015 23rd Telecommunications Forum (TELFOR), pp. 281-284, IEEE, 2015.
View in Google Scholar

C. Thammarat and C. Techapanupreeda, "A Secure Authentication and Key Exchange Protocol for M2M Communication", in: 2021 9th International Electrical Engineering Congress (IEECON), Pattaya, Thailand, pp. 456-459, 2021.
View in Google Scholar

H. Tan et al., "A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks", IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9570-9584, 2016.
View in Google Scholar

L. Xiaoyong and Z. Hui, "Identity-based Authenticated Key Exchange Protocols", in: 2010 International Conference on Educational and Information Technology, Chongqing, China, vol. 3, pp. 85-87, 2010.
View in Google Scholar

E.-H. Lu, W.-T. Ko, and H.K.-C. Chang, "A Novel ECC Protocol for Key Exchanging in Non-PKI Networks", in: Proceedings of 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Harbin, China, vol. 1, pp. 822-825, 2011.
View in Google Scholar

S. Jarecki, M. Jubur, H. Krawczyk, N. Saxena, and M. Shirvanian, "Two-factor Password-authenticated Key Exchange with End-to-end Security", ACM Transactions on Privacy and Security (TOPS), vol. 24, no. 3, pp. 1-37, 2021.
View in Google Scholar

A. Abusukhon, Z. Mohammad, and A. Al-Thaher, "Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models", in: 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, pp. 73-78, 2019.
View in Google Scholar

C. Cremers, Scyther: Semantics and Verification of Security Protocols, PhD thesis, Mathematics and Computer Science, Eindhoven University of Technology, 2006.
View in Google Scholar

C. Cremers, "The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols", Lecture Notes in Computer Science, vol. 5123, pp. 414-418, Springer, 2008.
View in Google Scholar

G. Lowe, "A Hierarchy of Authentication Specifications", in: Proceedings 10th Computer Security Foundations Workshop, Rockport, USA, pp. 31-43, 1997.
View in Google Scholar

C. Cremers and S. Mauw, Operational Semantics and Verification of Security Protocols, Springer-Verlag, 188 p., 2012 (ISBN: 9783540786351).
View in Google Scholar

L. Dong and K. Chen, Cryptographic Protocol. Security Analysis Based on Trusted Freshness, Springer-Verlag, 384 p., 2012 (ISBN: 9783642240720).
View in Google Scholar

National Institute of Standards and Technology (NIST), "Digital Signature Standard (DSS)", Federal Information Processing Standards Publication, FIPS PUB 186-4, 2013.
View in Google Scholar

Downloads

Published

2024-01-18 — Updated on 2024-03-26

Issue

Section

ARTICLES FROM THIS ISSUE

How to Cite

[1]
A. Chmielowiec, L. Klich, and W. Woś, “Energy Efficient ECC Authenticated Key Exchange Protocol for Star Topology Wireless Sensor Networks”, JTIT, vol. 95, no. 1, pp. 1–10, Mar. 2024, doi: 10.26636/jtit.2024.1.1389.