Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
Yassine Essadraoui, Mohamed Dafir Ech-cherif El Kettani
2017
Abstract
Key management is one of the biggest problems in IoT security. The Internet Key Exchange (IKE) protocol is well known as a secure key exchange protocol to establish secure channels between two hosts. However, IKE uses RSA as public key cryptography algorithm that is based on Diffie-Hellman (DH) key exchange which is very heavy, in term of arithmetic operations, for very constrained resources devices such as the case for WSNs. In this paper, we propose to use Multivariate Quadratic Quasigroups (MQQ) to negotiate and share a secret key between two sensors. Phase 1 of the IKE protocol is supposed, by the proposal in this paper, to use MQQ instead of Diffie-Hellman (DH) key exchange.
References
- Breu, F., Guggenbichler, S., Wollmann, J., 2008. PKCS #1: RSA Encryption Version 1.5. Vasa, Request for Comments 1-19.
- Dimitrova, V., Markovski, J., 2004. On Quasigroup Pseudo Random Sequence Generators. Proc. 1-st Balk. Conf. Informatics, Y. Manolopoulos P. Spirakis eds 21-23.
- Ding, J., Yang, B.-Y., 2009. Multivariate public key cryptography, in: Bernstein, D.J., Buchmann, J., Dahmen, E. (Eds.), Post-Quantum Cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 193-241. doi:10.1007/978-3-540-88702-7_6
- El-Hadedy, M., Gligoroski, D., Knapskog, S.J., 2008. High performance implementation of a public key block cipher-mqq, for fpga platforms, in: Reconfigurable Computing and FPGAs, 2008. ReConFig'08. International Conference on. pp. 427- 432.
- Essadraoui, Y., Dafir Ech-cherif El Kettani, M., 2015. Wireless sensor node's authentication scheme based on Multivariate Quadratic Quasi-groups. 2015 Third World Conf. Complex Syst. 1-6. doi:10.1109/ICoCS.2015.7483320
- Gligoroski, D., Markovski, S., Knapskog, S.J., 2008a. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. Proc. Am. Conf. Appl. Math. abs/0808.0, 44-49.
- Gligoroski, D., Markovski, S., Knapskog, S.J., 2008b. Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups, in: Proceedings of the American Conference on Applied Mathematics, MATH'08. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 44-49.
- Hallqvist, N., Keromytis, A. D., 2000. Implementing Internet Key Exchange (IKE), in: Proceedings of the Annual USENIX Technical Conference, Freenix Track, ATEC 7800. USENIX Association, Berkeley, CA, USA, pp. 201-214.
- Healy, M., Newe, T., Lewis, E., 2007. Power Management in Operating Systems for Wireless Sensor Nodes, in: Sensors Applications Symposium, 2007. SAS 7807. IEEE. pp. 1-6. doi:10.1109/SAS.2007.374366
- Kavitha, T., Sridharan, D., 2010. Security vulnerabilities in wireless sensor networks: A survey. J. Inf. Assur. Secur. 5, 31-44.
- Kipnis, A., Patarin, J., Goubin, L., 1999. Unbalanced oil and vinegar signature schemes, in: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), EUROCRYPT'99. Springer-Verlag, Berlin, Heidelberg, pp. 206-222. doi:10.1007/3-540- 48910-X_15
- Kivinen, T., Snyder, J., 2015. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). Request for Comments 1-18. doi:10.17487/rfc7427
- Maughan D, Schertler M, Schneider M, T.J., 1998. Internet Security Association and Key Management Protocol (ISAKMP), Rfc 2408, Request for Comments. IETF. doi:10.17487/rfc2408
- Moh, T., 1999. A public key system with signature and master key functions. Comm. Algebr. 27, 2207-2222.
- Patarin, J., 1996. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. Adv. CryptologyEUROCRYPT, EUROCRYPT'96 1-40. doi:10.1007/3-540-68339-9_4
- Patarin, J., Patarin, J., Goubin, L., Goubin, L., 1997. Trapdoor one-way permutations and multivariate polynominals. Inf. Commun. Secur. First Int. Conf. ICICS'97, Beijing, China, Novemb. 11-14, 1997, Proc. 1334, 356-368. doi:10.1007/BFb0028491
- Quirino, G.S., Moreno, E.D., 2013. Architectural Evaluation of Asymmetric Algorithms in ARM Processors. Int. J. Electron. Electr. Eng. 1, 39-43. doi:10.12720/ijeee.1.1.39-43
- R.Atkinson, 1995. {S}ecurity {A}rchitecture for the {I}nternet {P}rotocol, Request for Comments. IETF.
- Shamir, A., 1994. Efficient Signature Schemes Based on Birational Permutations, in: \ifnum\shortbib=1 {CRYPTO}\else{Advances in Cryptology -- {CRYPTO}}\fi'93. Springer-Verlag, pp. 1-12. doi:10.1007/3-540-48329-2_1
- Shi, E., Perrig, A., 2004. Designing secure sensor networks. IEEE Wirel. Commun. 11, 38-43. doi:10.1109/MWC.2004.1368895
- Smith, J.D.H., 2007. An Introduction to Quasigroups and Their Representations. CRC Press.
- Zhu, L., Jaganathan, K., Lauter, K., 2008. Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). Request for Comments.
Paper Citation
in Harvard Style
Essadraoui Y. and Dafir Ech-cherif El Kettani M. (2017). Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 224-231. DOI: 10.5220/0006241902240231
in Bibtex Style
@conference{iotbds17,
author={Yassine Essadraoui and Mohamed Dafir Ech-cherif El Kettani},
title={Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={224-231},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006241902240231},
isbn={978-989-758-245-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
SN - 978-989-758-245-5
AU - Essadraoui Y.
AU - Dafir Ech-cherif El Kettani M.
PY - 2017
SP - 224
EP - 231
DO - 10.5220/0006241902240231