Advanced Key Management Scheme based on ECC to defend Non-Differential side channel attack for HSN

Shoba Bindu C*, CH. Suman**
* Associate Professor, JNTUACE, Anantapur, Andhra Pradesh.
** JNTUACE, Anantapur, Andhra Pradesh.
Periodicity:January - March'2011
DOI : https://doi.org/10.26634/jse.5.3.1383

Abstract

In Elliptic Curve Cryptography (ECC)-based Key management Scheme, the pair of ECC public and private keys is generated for all nodes in Heterogeneous Sensor Network and each node forms a shared key with their communication neighbors to establish secured connection. In Elliptic Curve Cryptography, by using a Simple power Analysis (SPA), an attacker is able to recover some secret data. This type of attack is called Non-Differential side channel attack. We propose an efficient Key Management Scheme which prevents non-differential side channel attack by including the unified addition formula for point doubling and point addition to perform point multiplication in ECC.  The performance evaluation show that our key management scheme can achieve significant reduction on power consumption and Storage space requirement than previous schemes. It also minimizes communication overhead and provides reliability against node failures.

Keywords

Heterogeneous Sensor Network, Key Management Scheme, Security, Elliptic Curve Cryptography, Non-Differential Side Channel Attack.

How to Cite this Article?

Shoba Bindu C and CH. Suman (2011). Advanced Key Management Scheme based on ECC to defend Non-Differential side channel attack for HSN. i-manager’s Journal on Software Engineering, 5(3),47-54. https://doi.org/10.26634/jse.5.3.1383

References

[1]. L. Girod, T. Stathopoulos, N. Ramanathan, et al. (2004). “A system for simulation, emulation, and deployment of heterogeneous sensor networks,” in Proc. ACM SenSys .
[2]. M. Yarvis, N. Kushalnagar, H. Singh, et al. (2005). “Exploiting heterogeneity in sensor networks,” in Proc. IEEE INFOCOM 2005, Miami, FL, Mar.
[3]. L. Eschenauer and V.D. Gligor, (2002). “A key management scheme for distributed sensor networks,” in Proc. 9th ACM Conference on Computer and Communication Security, pp. 41-47, Nov.
[4]. N. Koblitz, (1987). “Elliptic curve cryptosystems, “Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
[5]. N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz,(2004). “Comparing elliptic curve cryptography th and RSA on 8-bit CPUs,” in Proc. 6 International Workshop on Cryptographic Hardware and Embedded Systems, Boston, MA, Aug.
[6]. J.M. Kahn, R.H. Katz, and K.S.J. Pister, (1999). “Mobile networking for smart dust,” in Proc. ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom), Seattle, WA, August, pp. 271-278.
[7]. H. Chan, A. Perrig, and D. Song,(2003). “Random key predistribution schemes for sensor networks,” in Proc. 2003 IEEE Symposium on Security and Privacy, May, pp. 197-213.
[8]. Xiaojiang Du, (2009). Member, IEEE, Mohesen Guizani, Fellow, IEEE, Yang Xiao, Senior Member, IEEE, and Hsiao-Hwa Chen, Senior Member, IEEE “A Routing- Driven elliptic Curve cryptography Based Key Management Scheme for Heterogeneous Sensor Networks” IEEE Transaction on Wireless Communications, Vol.8, No. 3 March, pp.1223-1229.
[9]. I. Blake, G. Seroussi, and N. Smart, (1999). Elliptic Curves in Cryptography, Mathematical Society, Lecture Note Series 265, Press, 1999.
[10]. B. Karp and H.T. Kung, (2000). “GPSR: greedy perimeter stateless routing for wireless networks,” in Proc. 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254.
[11]. A. Chadrakasan and R. Brodersen, (1992). “Low power CMOS Digital Design”, IEEE Solid state circuits, Vol. 27, no. 4, pp.473-484, Apr.
[12]. MICA2 Mote Datasheet, www.xbow.com.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.