Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology
Abstract
:1. Introduction
- We propose a modified scheme that can be used for any arbitrary ;
- We discuss and prove the security of the proposed scheme against the coalition of the sensor nodes.
2. Literature Review
2.1. Application of Blom’s Scheme in WSN
2.2. Application of Blom’s Scheme in DLT
3. Preliminaries
3.1. Greatest Common Divisor
3.2. Elliptic Curves
- 1.
- Let H be any subgroup of G. The order of H divides the order of G;
- 2.
- Let . The order of g divides the order of G.
3.3. Lagrange Interpolation Polynomial
4. Materials and Methods
4.1. Blom’s Key Pre-Distribution Scheme
- Before the deployment of the sensor nodes, an offline key distribution center will first construct a matrix C over a finite field of order q, where q is a prime power and . Matrix C is publicly known, which means any sensors and adversaries are allowed to know C. Let be the column of matrix C, where . Note that is a -tuple over . Column is assigned to node .
- Then, the key distribution center will create a random symmetric matrix D over . Matrix D must be kept secret, which means any sensors and adversaries are not allowed to know D.
- The key distribution center will compute an matrix M such that , where is the transpose of .
- Let be the i row of matrix M, where . Note that is a -tuple over . The key distribution center will then give to node over a secure channel.
- Let us say node wants to communicate with node . Both will compute the same key, as follows:
- Node will compute , which we call . Note that is a single element in .
- Node will compute , which we call . Note that is a single element in .
4.2. Scalar Multiplication on Elliptic Curves over Finite Field
4.3. Proposed Algorithm for Arbitrary
- 1.
- Let p be a prime greater than 3, and p is publicly known to all. Let N be the total number of nodes. Let be the s node where . The trusted authority (TA) chooses an elliptic curve E over prime field such that
- 2.
- is the set of integers modulo . TA selects an element for node , which is also made public such that for .
- 3.
- Let . For , the TA chooses random points where such that and forms the polynomialThe chosen and the polynomial f above are privately known only by the TA. The polynomial f is symmetric, i.e., . The number of points to be chosen by the TA depends on the value of , where
- 4.
- For each node , the TA computesThe TA then privately sends to node over a secure channel. Note that node only knows and does not know the coefficients . is privately known only by the TA and node . Note that the scalar of each point can be reduced to modulo based on Theorem 3.
- 5.
- If two nodes, and , want to communicate with each other, they individually compute the common key (shared key), (the same as ), where node computesNote that .
4.4. Example for
- 1.
- Let and p be publicly known to all. TA chooses an elliptic curve E over prime field such that
- 2.
- Note that , which is a prime. TA selects an element for node , which is also made public such that for , as shown below.
- 3.
- Let . For , the TA chooses random points where such that , as shown below.The TA then forms the secret polynomial , as shown below.
- 4.
- For node , the TA computesFor node , the TA computesFor node , the TA computesThe TA then privately sends , , and to nodes , and , respectively, over a secure channel. Note that the scalar of each point can be reduced to modulo based on Theorem 3.
- 5.
- If and want to communicate with each other, they individually compute the common key (shared key), (the same as ), where node computesNote that .
5. Results
- is symmetric, i.e., ;
- For , it holds that ;
- has a degree of at most in both x and y, since has a degree of at most in both x and y and
6. Discussion
6.1. The Application of the Proposed Scheme in Hyperledger Fabric DLT
6.2. The Pros and Cons
- 1.
- The proposed scheme has high connectivity, which means all nodes in the network are able to compute the shared keys among each other. In other words, the probability of sharing keys between nodes is 1.
- 2.
- The proposed scheme has high scalability, which means our proposed scheme can be used in networks with a huge number of nodes.
- 3.
- The proposed scheme supports the mobility of a node as long as the identities or the public keys of the new neighboring nodes are already stored in the moving node.
- 4.
- The information needed to establish the shared keys are stored in the nodes before deployment by an offline TA. Therefore, an adversary cannot attack the TA to obtain the secret polynomial and the information required to compute the shared keys.
- 5.
- Elliptic curves are used in the proposed scheme, which increases the complexity of the calculation. Scalar multiplication and the group law of elliptic curves are implemented, instead of just adding and multiplying integers.
- 6.
- This scheme can be implemented in WSNs, and also possibly in DLT technology, as discussed earlier.
- 1.
- The proposed scheme does not support the flexibility requirement. In other words, if our proposed scheme is implemented in a network, then new joining nodes cannot simply join the network, since the identities or the public keys of the new nodes were not distributed in the existing nodes before deployment.
- 2.
- The proposed scheme is not secure against the capture of nodes. However, Albakri et al. [23] mentioned that there are several security mechanisms that can be utilized to eliminate this problem, such as tamper-proof mechanisms to protect the information in the nodes from an attacker, even if the attacker captures the nodes.
6.3. The Comparison of the Proposed Scheme with Other Existing Schemes
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
WSN | wireless sensor network |
TA | trusted authority |
DLT | distributed ledger technology |
MSP | membership service provider |
MRD | maximum rank distance |
MDS | maximum distance separable |
PKI | public key infrastructure |
References
- Dargie, W.; Poellabauer, C. Fundamentals of Wireless Sensor Networks: Theory and Practice, 1st ed.; John Wiley & Sons Ltd.: West Sussex, UK, 2010; ISBN 978-0-470-99765-9. [Google Scholar]
- Gaubatz, G.; Kaps, J.-P.; Sunar, B. Public key cryptography in sensor networks–revisited. In Proceedings of the Security in Ad-hoc and Sensor Networks, Heidelberg, Germany, 6 August 2004; pp. 2–18. [Google Scholar]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public–key cryptosystems. Commun. ACM 1983, 26, 96–99. [Google Scholar] [CrossRef]
- Miller, V.S. Use of Elliptic Curves in Cryptography. In Proceedings of the Advances in Cryptology—CRYPTO ’85, Santa Barbara, CA, USA, 18–22 August 1985; Lecture Notes in Computer Science. Williams, H.C., Ed.; Springer: Berlin/Heidelberg, Germany, 1985; Volume 218, pp. 417–426. [Google Scholar]
- Ahlawat, P. Key distribution and management in wsn security: A state of the art. Int. Innov. Technol. Explor. Eng. (IJITEE) 2019, 9, 462–472. [Google Scholar] [CrossRef]
- Zhang, J.; Varadharajan, V. Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 2010, 33, 63–75. [Google Scholar] [CrossRef]
- Premamayudu, B.; Rao, B.T.; Rao, K.V.; Peram, S.R. Key pre- distribution protocol for node to node for wireless sensor networks. Ann. R. Soc. Cell Biol. 2021, 25, 16769–16779. [Google Scholar]
- Dargahi, T.; Javadi, H.H.; Hosseinzadeh, M. Application-specific hybrid symmetric design of key pre–distribution for wireless sensor networks. Secur. Commun. Netw. 2015, 8, 1561–1574. [Google Scholar] [CrossRef]
- Blom, R. An optimal class of symmetric key generation systems. In Proceedings of the Advances in Cryptology EUROCRYPT 1984, Paris, France, 9–11 April 1984; Beth, T., Cot, N., Ingemarsson, I., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 1985; Volume 209, pp. 335–338. [Google Scholar]
- Udin, M.N.; Mohd Amin, F.A.; Abdul Malek, A.; Zulkifili, N.A.; Ghazali, N.A.; Mohd Ridzuwan, S.A. Implementation of Blom’s key pre-distribution scheme by using elliptic curve cryptography. Malays. J. Comput. 2021, 6, 812–822. [Google Scholar]
- El Ioini, N.; Pahl, C. A Review of Distributed Ledger Technologies. In Proceedings of the OTM 2018 Conferences, On the Move to Meaningful Internet Systems, Valletta, Malta, 22–26 October 2018; Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., Meersman, R., Eds.; Springer: Cham, Switzerland, 2018; pp. 277–288. [Google Scholar]
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography, 1st ed.; CRC Press: Boca Raton, FL, USA, 1996; ISBN 0-8493-8523-7. [Google Scholar]
- Du, W.; Deng, J.; Han, Y.S.; Varshney, P.K.; Katz, J.; Khalili, A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 2005, 8, 228–258. [Google Scholar] [CrossRef]
- Lazos, L. ECE596C: Key Distribution. Available online: https://uweb.engr.arizona.edu/~ece596c/lazos/lectures/lecture15.pdf (accessed on 12 October 2022).
- Reddy, R.S. Key management in wireless sensor networks using a modified Blom’s scheme. arXiv 2011, arXiv:1103.5712. [Google Scholar] [CrossRef]
- Khan, E.; Gabidulin, E.; Honary, B.; Ahmed, H. Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks. J. IET Wirel. Sens. Syst. 2012, 2, 108–114. [Google Scholar] [CrossRef]
- Wang, Y.; Qin, Z.; Zhang, Q.; Wang, H.; Huang, J. A key pre- distribution scheme based on multiple key spaces in wireless sensor networks. In Proceedings of the 2014 Tenth International Conference on Computational Intelligence and Security, Kunming, China, 15–16 November 2014; pp. 652–656. [Google Scholar]
- Hussain, A.W.; Ibrahem, M.K. An efficient pairwise and group key management scheme for wireless sensor network. J. Int. J. Enhanc. Res. Sci. Technol. Eng. 2015, 4, 25–31. [Google Scholar]
- Belim, S.V.; Belim, S.Y. Implementation of simplex channels in the Blom’s keys pre-distribution scheme. J. Phys. Conf. Ser. 2019, 1210, 1–5. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Hyperledger. Available online: http://www.hyperledger.org (accessed on 29 November 2022).
- Hyperledger Fabric. Available online: http://github.com/hyperledger/fabric (accessed on 29 November 2022).
- Albakri, A.; Harn, L.; Maddumala, M. Polynomial-Based Lightweight Key Management in a Permissioned Blockchain. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
- Summary for Greatest Common Divisor. Available online: https://www.xiangsun.org/wp-content/uploads/2013/02/gcd.pdf (accessed on 12 October 2022).
- Washington, L.C. Elliptic Curves: Number Theory and Cryptography, 2nd ed.; Chapman & Hall/CRC: Boca Raton, FL, USA, 2008; ISBN 978-1-4200-7146-7. [Google Scholar]
- Pinter, C.C. A Book of Abstract Algebra, 2nd ed.; Dover Publications, Inc.: Mineola, NY, USA, 1990; ISBN 978-0-486-47417-5. [Google Scholar]
- Burden, R.L.; Faires, J.D. Numerical Analysis, 9th ed.; Brooks/Cole, Cengage Learning: Boston, MA, USA, 2011; ISBN 978-0-538-73351-9. [Google Scholar]
- Kandi, M.A.; Kouicem, D.E.; Doudou, M.; Lakhlef, H.; Bouabdallah, A.; Challal, Y. A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Comput. Commun. 2022, 191, 11–25. [Google Scholar] [CrossRef]
Notation | Description |
---|---|
p | A prime |
Finite field with p elements | |
N | The total number of nodes |
A positive integer | |
gcd | The greatest common divisor of integers a and b |
E | An elliptic curve defined over field K of form where |
The set of points with coordinates in some field L on E, i.e., | |
The number of points on E | |
Integers modulo | |
P | A point on E |
Point at infinity on E | |
A secret symmetric bivariate polynomial known only by the trusted authority | |
The node where | |
The public key of node used in the proposed scheme where | |
, i.e., secret information given to node where | |
, i.e., the shared key between node and node where , | |
and |
Requirement | Description |
---|---|
Resilience | Capturing devices must have a minimal impact on the network security |
Connectivity | The probability of sharing keys between nodes must be maximum |
Mobility | Moving devices must share keys with their new neighbors |
Flexibility | Devices must be able to join or leave the network at any time |
Scalability | Increasing the network size must not degrade performance |
Scheme | Resilience | Connectivity | Mobility | Flexibility | Scalability | Use of Elliptic Curves | Value of |
---|---|---|---|---|---|---|---|
Blom [9] | 1 | Yes (within network) | No | High | No | Any positive integer | |
Lazos [14] | 1 | Yes (within network) | No | High | No | Any positive integer | |
Khan et al. [16] | N (total number of nodes) | 1 | Yes (within network) | Yes | High | No | Any positive integer |
Wang et al. [17] | 1 | Yes (within network) | Yes | High | No | Any positive integer | |
Udin et al. [10] | Unknown | 1 | Yes (within network) | No | High | Yes | 1 |
Our scheme | 1 | Yes (within network) | No | High | Yes | Any positive integer |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Antony, S.N.F.M.A.; Bahari, M.F.A. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. J. Sens. Actuator Netw. 2023, 12, 15. https://doi.org/10.3390/jsan12010015
Antony SNFMA, Bahari MFA. Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. Journal of Sensor and Actuator Networks. 2023; 12(1):15. https://doi.org/10.3390/jsan12010015
Chicago/Turabian StyleAntony, Siti Noor Farwina Mohamad Anwar, and Muhammad Fatihin Afiq Bahari. 2023. "Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology" Journal of Sensor and Actuator Networks 12, no. 1: 15. https://doi.org/10.3390/jsan12010015
APA StyleAntony, S. N. F. M. A., & Bahari, M. F. A. (2023). Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology. Journal of Sensor and Actuator Networks, 12(1), 15. https://doi.org/10.3390/jsan12010015