[go: up one dir, main page]

Skip to main content

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks

  • Conference paper
  • First Online:
IT Convergence and Security 2012

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

  • 1052 Accesses

Abstract

The concept of forward secrecy is extended to wireless sensor networks where it is frequent that nodes run out of energy and new nodes join the network. However it should not be able to retrieve the previous session key or some crucial information. In 2011 Hagras et al. proposed a key management scheme for heterogeneous wireless sensor networks, which satisfies confidentiality, authentication, integrity and unforgetability but lacks forward secrecy. In this paper, the shortcomings of the victim scheme has been extricated and repaired with the help of Elliptic Curve Discrete logarithm problem (ECDLP). An elliptic curve based signcryption key management scheme has been proposed which includes forward secrecy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zheng Y (1997) Digital signcryption or how to achieve Cost (Signature & Encryption) cost (Signature)+cost (Encryption). In: Advances in cryptology—CryptoÕ97 LNCS 1294, Springer, pp 165–179

    Google Scholar 

  2. Zheng Y (1998) Shortened digital signature, signcryption and compact and unforgetable key agreement schemes. In: IEEE P1363a: standard specifications for public-key cryptography: additional techique

    Google Scholar 

  3. Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68:227–233

    Article  MathSciNet  Google Scholar 

  4. Zheng Y (1998) Signcryption and its application in efficient public key solutions. In: Proceeding of ISW ‘97, LNCS vol 1396, Springer, pp 291–312

    Google Scholar 

  5. Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Proceedings of PKCÕ98LNCS 1431, Springer pp 55–59

    Google Scholar 

  6. Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Proceedings of 1999 international workshop on practice and theory in public key cryptography (PKCÕ99), 1–3 March 1999, Kamakura, JapanLNCS 1560, Springer, pp 69–81

    Google Scholar 

  7. Jung HY, Chang KS, Lee DH, Lim JI (2001) Signcryption schemes with forward secrecy. In: Proceeding of WISA 2, pp 403–475

    Google Scholar 

  8. Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. J Appl Math Comput (Elsevier Inc.), 167 (2):870–881. DOI: 10.1016/j.amc.2004.06.124

  9. Kim RH, Youm HY (2006) Secure authenticated key exchange protocol based on EC using signcryption scheme. In: Proceeding international conference on hybrid information technology (IEEE Computer society), 8 June 2006

    Google Scholar 

  10. Zhou X (2009) Improved signcryption scheme with public verifiability. In: Proceeding Pacific-Asia conference on knowledge engineering and software engineering (IEEE Computer Society), 4 Sept 2009

    Google Scholar 

  11. Toorani M, Beheshti AA (2009) An elliptic curve-based signcryption scheme with forward secrecy. J Appl Sci 9(6):1025–1035

    Article  Google Scholar 

  12. Elsayed M, Hasan E (2009) Elliptic curve signcryption with encrypted message authentication and forward secrecy. Int J Comput Sci Netw Sec 9(1)

    Google Scholar 

  13. Said EK, Amr IH (2009) New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on elliptic curve cryptography. In: Proceedings of the 2009 national conference on radio science. Cairo, Egypt

    Google Scholar 

  14. Hagras EA, Aly HH, Saied DI (2010) An efficient key management scheme based on elliptic curve signcryption for heterogeneous wireless sensor networks. UCST 1(2):459–474

    Google Scholar 

  15. Hagras EA, Aly HH, Saied DI (2011) Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks. In: 28th NRSC’11 April 26–28, 2011, National Telecommunication Institute, Egypt

    Google Scholar 

  16. Hankerson D, Menezes AJ, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Bala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Bala, S., Sharma, G., Verma, A.K. (2013). An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_17

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics