Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups

Yassine Essadraoui, Mohamed Dafir Ech-cherif El Kettani

Abstract

Key management is one of the biggest problems in IoT security. The Internet Key Exchange (IKE) protocol is well known as a secure key exchange protocol to establish secure channels between two hosts. However, IKE uses RSA as public key cryptography algorithm that is based on Diffie-Hellman (DH) key exchange which is very heavy, in term of arithmetic operations, for very constrained resources devices such as the case for WSNs. In this paper, we propose to use Multivariate Quadratic Quasigroups (MQQ) to negotiate and share a secret key between two sensors. Phase 1 of the IKE protocol is supposed, by the proposal in this paper, to use MQQ instead of Diffie-Hellman (DH) key exchange.

References

  1. Breu, F., Guggenbichler, S., Wollmann, J., 2008. PKCS #1: RSA Encryption Version 1.5. Vasa, Request for Comments 1-19.
  2. Dimitrova, V., Markovski, J., 2004. On Quasigroup Pseudo Random Sequence Generators. Proc. 1-st Balk. Conf. Informatics, Y. Manolopoulos P. Spirakis eds 21-23.
  3. Ding, J., Yang, B.-Y., 2009. Multivariate public key cryptography, in: Bernstein, D.J., Buchmann, J., Dahmen, E. (Eds.), Post-Quantum Cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 193-241. doi:10.1007/978-3-540-88702-7_6
  4. El-Hadedy, M., Gligoroski, D., Knapskog, S.J., 2008. High performance implementation of a public key block cipher-mqq, for fpga platforms, in: Reconfigurable Computing and FPGAs, 2008. ReConFig'08. International Conference on. pp. 427- 432.
  5. Essadraoui, Y., Dafir Ech-cherif El Kettani, M., 2015. Wireless sensor node's authentication scheme based on Multivariate Quadratic Quasi-groups. 2015 Third World Conf. Complex Syst. 1-6. doi:10.1109/ICoCS.2015.7483320
  6. Gligoroski, D., Markovski, S., Knapskog, S.J., 2008a. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. Proc. Am. Conf. Appl. Math. abs/0808.0, 44-49.
  7. Gligoroski, D., Markovski, S., Knapskog, S.J., 2008b. Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups, in: Proceedings of the American Conference on Applied Mathematics, MATH'08. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, pp. 44-49.
  8. Hallqvist, N., Keromytis, A. D., 2000. Implementing Internet Key Exchange (IKE), in: Proceedings of the Annual USENIX Technical Conference, Freenix Track, ATEC 7800. USENIX Association, Berkeley, CA, USA, pp. 201-214.
  9. Healy, M., Newe, T., Lewis, E., 2007. Power Management in Operating Systems for Wireless Sensor Nodes, in: Sensors Applications Symposium, 2007. SAS 7807. IEEE. pp. 1-6. doi:10.1109/SAS.2007.374366
  10. Kavitha, T., Sridharan, D., 2010. Security vulnerabilities in wireless sensor networks: A survey. J. Inf. Assur. Secur. 5, 31-44.
  11. Kipnis, A., Patarin, J., Goubin, L., 1999. Unbalanced oil and vinegar signature schemes, in: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), EUROCRYPT'99. Springer-Verlag, Berlin, Heidelberg, pp. 206-222. doi:10.1007/3-540- 48910-X_15
  12. Kivinen, T., Snyder, J., 2015. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2). Request for Comments 1-18. doi:10.17487/rfc7427
  13. Maughan D, Schertler M, Schneider M, T.J., 1998. Internet Security Association and Key Management Protocol (ISAKMP), Rfc 2408, Request for Comments. IETF. doi:10.17487/rfc2408
  14. Moh, T., 1999. A public key system with signature and master key functions. Comm. Algebr. 27, 2207-2222.
  15. Patarin, J., 1996. Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms. Adv. CryptologyEUROCRYPT, EUROCRYPT'96 1-40. doi:10.1007/3-540-68339-9_4
  16. Patarin, J., Patarin, J., Goubin, L., Goubin, L., 1997. Trapdoor one-way permutations and multivariate polynominals. Inf. Commun. Secur. First Int. Conf. ICICS'97, Beijing, China, Novemb. 11-14, 1997, Proc. 1334, 356-368. doi:10.1007/BFb0028491
  17. Quirino, G.S., Moreno, E.D., 2013. Architectural Evaluation of Asymmetric Algorithms in ARM Processors. Int. J. Electron. Electr. Eng. 1, 39-43. doi:10.12720/ijeee.1.1.39-43
  18. R.Atkinson, 1995. {S}ecurity {A}rchitecture for the {I}nternet {P}rotocol, Request for Comments. IETF.
  19. Shamir, A., 1994. Efficient Signature Schemes Based on Birational Permutations, in: \ifnum\shortbib=1 {CRYPTO}\else{Advances in Cryptology -- {CRYPTO}}\fi'93. Springer-Verlag, pp. 1-12. doi:10.1007/3-540-48329-2_1
  20. Shi, E., Perrig, A., 2004. Designing secure sensor networks. IEEE Wirel. Commun. 11, 38-43. doi:10.1109/MWC.2004.1368895
  21. Smith, J.D.H., 2007. An Introduction to Quasigroups and Their Representations. CRC Press.
  22. Zhu, L., Jaganathan, K., Lauter, K., 2008. Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). Request for Comments.
Download


Paper Citation


in Harvard Style

Essadraoui Y. and Dafir Ech-cherif El Kettani M. (2017). Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups . In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS, ISBN 978-989-758-245-5, pages 224-231. DOI: 10.5220/0006241902240231


in Bibtex Style

@conference{iotbds17,
author={Yassine Essadraoui and Mohamed Dafir Ech-cherif El Kettani},
title={Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups},
booktitle={Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,},
year={2017},
pages={224-231},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006241902240231},
isbn={978-989-758-245-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security - Volume 1: IoTBDS,
TI - Wireless Sensor Networks IKE Phase One Negotiation Approach based on Multivariate Quadratic Quasi-groups
SN - 978-989-758-245-5
AU - Essadraoui Y.
AU - Dafir Ech-cherif El Kettani M.
PY - 2017
SP - 224
EP - 231
DO - 10.5220/0006241902240231