A denial-of-service happens when a network or a
node is targeted in view to make it unavailable or
unresponsive temporally or permanently.
Our proposal is free from this attack viewing that
every exchanged message contains ISAKMP header
which contains Initiator’s and Receiver’s cookie (C
I
,
C
R
)
Impersonation Attack
An impersonation attack is where a malicious
node presents itself to other network nodes by
impersonating a legitimate node in view to exchange
messages on behalf the legitimate node.
Our proposal is free from this attack viewing that
an attacker couldn’t read a message encrypted by the
legitimate node’s MQQ-based public key (which has
been already published by the BS).
7 CONCLUSION
A lightweight version of the IKE protocol based on
Multivariate Quadratic Quasi-groups (MQQ) is
discussed in this paper. MQQ is not based, like RSA
or ECC, on the difficulty of solving factorization
problem or discrete logarithm and is for this reason
MQQ is considered as a
post-quantum algorithm.
MQQ has emerged as an alternative to classical
cryptography schemes and was seen, as mentioned
before, that MQQ is faster, than RSA and ECC, in
encryption and decryption so it’s a promising public
key cryptography alternative, especially to adapt
existing protocols, like IKE in this paper, to wireless
sensor network’s context. A security analysis of the
proposed protocol against some known attacks is
done and is shown that the proposed protocol is
secure. We are in preparation of some
implementation for this approach to endorse it with
experimental results.
REFERENCES
Breu, F., Guggenbichler, S., Wollmann, J., 2008. PKCS
#1: RSA Encryption Version 1.5. Vasa, Request for
Comments 1–19.
Dimitrova, V., Markovski, J., 2004. On Quasigroup
Pseudo Random Sequence Generators. Proc. 1-st Balk.
Conf. Informatics, Y. Manolopoulos P. Spirakis eds
21–23.
Ding, J., Yang, B.-Y., 2009. Multivariate public key
cryptography, in: Bernstein, D.J., Buchmann, J.,
Dahmen, E. (Eds.), Post-Quantum Cryptography.
Springer Berlin Heidelberg, Berlin, Heidelberg, pp.
193–241. doi:10.1007/978-3-540-88702-7_6
El-Hadedy, M., Gligoroski, D., Knapskog, S.J., 2008.
High performance implementation of a public key
block cipher-mqq, for fpga platforms, in:
Reconfigurable Computing and FPGAs, 2008.
ReConFig’08. International Conference on. pp. 427–
432.
Essadraoui, Y., Dafir Ech-cherif El Kettani, M., 2015.
Wireless sensor node’s authentication scheme based
on Multivariate Quadratic Quasi-groups. 2015 Third
World Conf. Complex Syst. 1–6.
doi:10.1109/ICoCS.2015.7483320
Gligoroski, D., Markovski, S., Knapskog, S.J., 2008a. A
Public Key Block Cipher Based on Multivariate
Quadratic Quasigroups. Proc. Am. Conf. Appl. Math.
abs/0808.0, 44–49.
Gligoroski, D., Markovski, S., Knapskog, S.J., 2008b.
Multivariate Quadratic Trapdoor Functions Based on
Multivariate Quadratic Quasigroups, in: Proceedings
of the American Conference on Applied Mathematics,
MATH’08. World Scientific and Engineering
Academy and Society (WSEAS), Stevens Point,
Wisconsin, USA, pp. 44–49.
Hallqvist, N., Keromytis, A. ~D., 2000. Implementing
Internet Key Exchange (IKE), in: Proceedings of the
Annual USENIX Technical Conference, Freenix
Track, ATEC ’00. USENIX Association, Berkeley,
CA, USA, pp. 201–214.
Healy, M., Newe, T., Lewis, E., 2007. Power Management
in Operating Systems for Wireless Sensor Nodes, in:
Sensors Applications Symposium, 2007. SAS ’07.
IEEE. pp. 1–6. doi:10.1109/SAS.2007.374366
Kavitha, T., Sridharan, D., 2010. Security vulnerabilities
in wireless sensor networks: A survey. J. Inf. Assur.
Secur. 5, 31–44.
Kipnis, A., Patarin, J., Goubin, L., 1999. Unbalanced oil
and vinegar signature schemes, in: Lecture Notes in
Computer Science (Including Subseries Lecture Notes
in Artificial Intelligence and Lecture Notes in
Bioinformatics), EUROCRYPT’99. Springer-Verlag,
Berlin, Heidelberg, pp. 206–222. doi:10.1007/3-540-
48910-X_15
Kivinen, T., Snyder, J., 2015. Signature Authentication in
the Internet Key Exchange Version 2 (IKEv2).
Request for Comments 1–18. doi:10.17487/rfc7427
Maughan D, Schertler M, Schneider M, T.J., 1998.
Internet Security Association and Key Management
Protocol (ISAKMP), Rfc 2408, Request for
Comments. IETF. doi:10.17487/rfc2408
Moh, T., 1999. A public key system with signature and
master key functions. Comm. Algebr. 27, 2207–2222.
Patarin, J., 1996. Hidden fields equations (HFE) and
isomorphisms of polynomials (IP): Two new families
of asymmetric algorithms. Adv. Cryptology-
EUROCRYPT, EUROCRYPT’96 1–40.
doi:10.1007/3-540-68339-9_4
Patarin, J., Patarin, J., Goubin, L., Goubin, L., 1997.
Trapdoor one-way permutations and multivariate
polynominals. Inf. Commun. Secur. First Int. Conf.