90 likes | 230 Views
Public Key Authentication in Wireless Sensor Network (1). Jeonil Kang (dreamx@seclab.inha.ac.kr). Public Key Cryptography. Key agreement problem in wireless sensor network “How to set up secret keys between communicating nodes.” Symmetric key techniques
E N D
Public Key Authentication in Wireless Sensor Network (1) Jeonil Kang(dreamx@seclab.inha.ac.kr)
Public Key Cryptography • Key agreement problem in wireless sensor network • “How to set up secret keys between communicating nodes.” • Symmetric key techniques • The secret keys are pre-distributed among sensors before their deployment. • Due to the limitation on memory, symmetric key techniques are not able to achieve both a perfect connectivity and a perfect resilience for large-scale sensor networks. • Public key cryptography • eliminate the connectivity and resilience problems. • Common criticism: computational complexity and communication overhead. • ECC signature verification: 1.62s (160-bit Atmega 128) PKC becomes widely accepted for WSNs.
Public Key Authentication Non-certificate B B<CA> CA D C<CA> B<CA> B D<E> D<E> B<A> E B<A> A C<CA> C A C PKCA PKA PKE Certificate
Public Key Authentication with Hash • Trusted hash value • instead of trusted public key • (But, why do not they use certificate. Heavy?) • This method still has the memory-usage problem. • Merkle Tree Root Hash Φ(V)=hash(Φ(Vleft)||Φ(Vright)) Φ(Li)=hash(id,pki)
Merkle Tree Root Hash A’s proof H= A idA, pkA, A’s proof Communication Overhead = L × H B Root Hash
2-D Grid Based Scheme C S D B A S B A C S D Merkle Tree in node S
Memory / Communication Trade-off 2-D Grid Based Scheme (2 Root Hash) Naïve Scheme (2 Root Hash)