Internet DRAFT - draft-qin-cfrg-ibs-wsn
draft-qin-cfrg-ibs-wsn
INTERNET-DRAFT Zhongyuan Qin
Intended Status: Informational Jie Huang
Expires: October 2, 2015 Kerong Feng
Southeast University
April 2, 2015
An Identity-based Security Scheme for Wireless Sensor Networks
draft-qin-cfrg-ibs-wsn-00
Abstract
This document specifies an identity-based security scheme for
wireless sensor network (WSN) on the basis of Identity-Based
Encryption (IBE). Each cluster head can perform as a private key
generator (PKG) in case that the sole PKG is captured, which will
lead to the whole network disabled. The proposed scheme can reduce
the consumption of key resources and improve the security of the WSN
by dispersing PKG function. The analysis shows that the scheme can
resist various attacks.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
<Zhongyuan Qin> Expires <October 2, 2015> [Page 1]
INTERNET DRAFT <IBKM> <January 29, 2015>
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1. Requirements Language . . . . . . . . . . . . . . . . . . . 4
2.2. Definitions and Notation . . . . . . . . . . . . . . . . . 4
2.3. Abbreviations . . . . . . . . . . . . . . . . . . . . . . . 4
3. Network model . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Identity-based Security Scheme . . . . . . . . . . . . . . . . 5
4.1. Initialization phase . . . . . . . . . . . . . . . . . . . 5
4.2. Clustering phase . . . . . . . . . . . . . . . . . . . . . 5
4.3. Parameter distribution . . . . . . . . . . . . . . . . . . 6
4.4. Data aggregation phase . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 7
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 8
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
7.1. Normative References . . . . . . . . . . . . . . . . . . . 8
7.2. Informative References . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 9
<Zhongyuan Qin> Expires <October 2, 2015> [Page 2]
INTERNET DRAFT <IBKM> <January 29, 2015>
1. Introduction
Originated from the military field, the wireless sensor network (WSN)
has become a hot academic research topic. Wireless sensor networks
consist of a large number of tiny sensor nodes with microprocessor.
Because of the limited resource in each sensor node, volatile network
topology and openness in wireless channel, WSNs are vulnerable to
various attacks including eavesdropping, message replay, node capture
attacks, sybil attack, etc., particularly for the applications where
wireless sensor networks are deployed in a hostile environment or
used for some crucial purposes. In order to resist these threats,
recently researchers have proposed a variety of security
technologies, among that, encryption and signature are two important
technologies.
Compared with asymmetric key system, the main benefit of symmetric
key system is its low computing cost. But the drawback is that it
needs a key pre-distributed process and does not guaranty a perfect
connectivity (in random key distribution schemes, neighboring nodes
share a common key in terms of probability [EG]). To address the
problems aforementioned, researchers have been investigating more
efficient techniques of Public Key Cryptographic (PKC) in sensor
networks.
However, PKC usually needs a public key infrastructure (PKI) to
maintain the users' certificates for public keys. Besides, the
computation consumption and energy costs are high because the
certificates need to be verified in these protocols. To address such
problems, Shamir proposed the idea of identity-based public-key
cryptosystems[SHA] which simplified the certificate management.
Shamir's original motivation for suggesting identity-based encryption
was to simplify certificate management in e-mail systems. Soon after,
various identity-based techniques were proposed, but a fully
functional identity-based encryption scheme has not been found until
recently by Boneh and Franklin [BF]. Since then the ideas of IBE have
been used to design several other identity-based schemes for
different purposes.
The disadvantage of the current identity-based system lies in the
fact that the nodes' private key must be generated by the Key
Generator Center (KGC), which becomes the single point of failure in
WSNs. Once KGC is compromised, the network would be almost entirely
captured by the attacker.
This document specifies an identity-based security scheme for WSNs in
which each cluster head can perform as a KGC so as to improve the
security. It includes four procedures, i.e., initialization,
clustering, parameter distribution and data aggregation. Each node
<Zhongyuan Qin> Expires <October 2, 2015> [Page 3]
INTERNET DRAFT <IBKM> <January 29, 2015>
gets its private key from the cluster head which acts as KGC.
Analysis is given which shows our scheme can resist various attacks
to provide a strong protection in WSNs.
2. Terminology
2.1. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in [RFC2119].
2.2. Definitions and Notation
IBE Encryption: Identity-Based Encryption (IBE) is a Public-Key
encryption technology that allows a Public Key to be calculated from
an identity, and the corresponding Private Key to be calculated from
the Public Key. Therefore, additional computations to verify the
corresponding certificates are not needed.[RFC5091], [RFC5408], and
[RFC5409] describe algorithms required to implement the IBE.
E(k, x) Encryption of x with the key k
e(x, y) Bilinear map of x and y
PU_CH Public key of a cluster head
PR_CH Private key of a cluster head
PU_i Public key of a sensor node i
PR_i Private key of a sensor node i
s_ch a secret random number chose by CH
2.3. Abbreviations
BS Base Station
CH Cluster Head
N Sensor Node
PR Private Key
PU Public Key
3. Network model
<Zhongyuan Qin> Expires <October 2, 2015> [Page 4]
INTERNET DRAFT <IBKM> <January 29, 2015>
There are two types of WSN architectures available for WSN, one is
the hierarchical architecture and the other is the distributed flat
architecture. In this document we focus on the hierarchical
architecture.
In a hierarchical wireless sensor network, all nodes are classified
into three categories: base station, cluster heads and sensor nodes.
A base station/sink node (BS) is typically a gateway to another
network. It collects sensor node readings, performs costly operations
for sensor nodes and manages the network. It is assumed to be trusted
and be the center of the entire network. In contrast, sensor nodes
are with limited battery power, memory size, data processing
capability and short radio transmission range. Cluster heads have
more resources than ordinary nodes which are equipped with high power
batteries, large memory storage, powerful antenna and data processing
capabilities.
In our scheme, we choose the cluster head within a certain distance
in case that the cluster head consumes more energy during
communicating with base station. Each sensor node in the same cluster
has the same opportunity to be chosen as cluster head. Periodic
replacement of cluster head can avoid the death of the main nodes,
and guarantee the connectivity of WSNs.
4. Identity-based Security Scheme
4.1. Initialization phase
Base station (BS) randomly chooses an elliptic curve E in finite
field F(p)and a point P in the elliptic curve E before the nodes
deployment. The master key s is only known by the base station. All
nodes preset the same parameters(q,G1,G2,e,n,r,P_pub,H1,H2), where q
is a prime number, G1 and G2 are two groups of order q, e:G1*G1->G2
is a bilinear map, n is the length of hash function, r is used to
calculate the mapping value of the public key, P is a random point in
elliptic curve E, H1 and H2 denote two different hash functions,
P_pub=s*P is the public value, PU_i=H1(ID_i) is the public key and
PR_i=s*PU_i is the private key of node i. BS computes private key and
then preloads it into each node.
4.2. Clustering phase
By default BS is deployed at the center of the region and all nodes
are randomly deployed in the monitoring field. According to the
geographical position, BS selects n cluster heads and puts all nodes
into n temporary clusters distributed evenly in geographical
position. Then, BS generates n random numbers K1,K2,...,Kn as a group
key of each cluster, distributes Ki to CH_i and stores the
<Zhongyuan Qin> Expires <October 2, 2015> [Page 5]
INTERNET DRAFT <IBKM> <January 29, 2015>
corresponding relationship between K and CH in the list. After that,
CH needs to register its identity CH_i in BS for the authentications
of the cluster-heads through base station to ensure the validity of
CH. At the same time, each CH broadcasts its identity to all nodes in
its cluster. Sensor node registers its identity to CH after receiving
the message.
Each CH performs as the function of private key generator (PKG) which
selects a random number s_ch to calculate a public value P_ch=s_ch*P.
CH also calculates public key PU_ch=H1(ID_ch) and private key
PR_ch=s_ch*PU_ch.
4.3. Parameter distribution
During this phase, PU_ch and group key K are distributed to the
sensor nodes in the cluster by the CH. The detail is described as
follow:
1. CH chooses a random number sigma and computes public key value
mapping g_i=H2(e(PU_i,P_pub)^r) for every node in the cluster.
2. CH constructs a polynomial F(g)=sigma*(sigma*e)^(g-g_i) by using
g_i and sigma, where e=2.718 is a constant. CH generates the
ciphertext C=((P_ch xor K)||(sigma xor K)||F(g)) and broadcasts it to
all sensor nodes in the cluster.
3. After receiving the broadcast message C=(U||V||F(g)), sensor node
i computes g_i=H2(e(PU_i,P_pub)^r)and substitutes g_i into the
polynomial F(g). Node i can get F(g_i)=sigma, V xor sigma=K,K xor
U=P_ch and uses P_ch to exchange messages between CH and sensor node
later. The value P_ch changes with the different cluster head, but
P_pub is always the same.
4.4. Data aggregation phase
In data aggregation phase, the data collected by sensor nodes is sent
to CH through multi-hop. Suppose a sensor node belongs to cluster j,
thus its cluster head is CH_j and group key is Kj. For simplicity we
use CH and K to represent CH_j and Kj.
1. Sensor node i generates a random number t and calculates the
mapping value g=e(PU_ch,P_ch). The ciphertext is C=E(K, ID_i||t*P||(m
xor H2(g^t))), where K is the group key and m is the collected data.
Nodes near the CH send message directly to the CH, the other nodes
far away from CH need multi-hop to deliver the collected information.
2. After receiving the message C=(M||W||F), CH decrypts ciphertext C
with group key K and authenticates the ID's legal status in order to
<Zhongyuan Qin> Expires <October 2, 2015> [Page 6]
INTERNET DRAFT <IBKM> <January 29, 2015>
prevent illegal member.
3. After authenticating, the CH computes e(PR_ch, W) with its private
key. And the collected data can be computed as m = F xor
H2(e(PR_ch,W)).
The correctness cab be proved as following.
e(PR_ch,W)=e(s_ch*PU_ch,t*P)=e(PU_ch,t*P)^s_ch=e(PU_ch,
s_ch*P)^t=e(PU_ch, P_ch)^t=g^t
5. Security Considerations
Former schemes including IBE suffered from this "the security of
master key" problem [SHA]. Once getting the master key s, adversary
can easily compute all nodes' private key. In our scheme each cluster
head acts as a PKG, which changes the situation that there is only
one PKG in the whole network.
The analysis and simulations show that the proposed scheme has high
ability to resist various attacks and provides strong protection for
the WSNs.
Hello Flood Attack: In our scheme, there is no hello message between
each node at the first time. Instead, CH broadcasts its identity
after being chosen as the cluster head, BS verifies the nodes in each
cluster's list and non-CH nodes directly register their identity to
CH. The session keys are distributed in a group key form.
Sinkhole Attack: In initialization phase, BS randomly chooses K
cluster heads based on location. This avoids dividing cluster only
relying on energy. In a cluster, CH will be periodically changed, and
the criterions of selecting a new cluster head include energy,
distance to former cluster head, et al. Therefore it is difficult to
appear sinkhole attack.
Sybil Attack: The proposed scheme ensures that each entity in the
WSNs always has a unique identification and its identity and vicinity
in terms of transmission range is securely authenticated and
verified. Each node must register to CH, after that, BS compares the
list received from every cluster head with its own list. During
forwarding message, only those sensor nodes with the same group key
have the right to forward message received.
Forward Secrecy: Assume that the adversary named Eve achieved the
group key K, and Eve try to decrypt the eavesdropped ciphertext.
However, Eve can't get the plaintext M because she cannot get the
CH's private key PR_ch which is used to generate plaintext M through
<Zhongyuan Qin> Expires <October 2, 2015> [Page 7]
INTERNET DRAFT <IBKM> <January 29, 2015>
bilinear mapping. In addition, after finishing collecting message,
group key would be revoked and replaced by a new random number.
6. IANA Considerations
This memo includes no request to IANA.
7. References
7.1. Normative References
[BF] Boneh, D. and M. Franklin, "Identity-Based Encryption from
the Weil Pairing", in SIAM J. of Computing, Vol. 32, No.
3, pp. 586-615, 2003.
[EG] Eschenauer, L.; Gligor, V.D. A key-management scheme for
distributed sensor networks.9th ACM Conference on Computer
and Communications Security, Washingtion, DC, USA, 18-22
November 2002; pp. 41-47.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[SHA] Shamir, A.: "Identity-based cryptosystems and signature
schemes". Proc. Advances in cryptology, Springer, 1985 pp.
47-53.
7.2. Informative References
[RFC5091] Boyen, X. and L. Martin, "Identity-Based Cryptography
Standard (IBCS) #1: Supersingular Curve Implementations of
the BF and BB1 Cryptosystems", RFC 5091, December 2007.
[RFC5408] Appenzeller, G., Martin, L., and M. Schertler, "Identity-
Based Encryption Architecture and Supporting Data
Structures", RFC 5408, January 2009.
[RFC5409] Martin, L. and M. Schertler, "Using the Boneh-Franklin and
Boneh-Boyen Identity-Based Encryption Algorithms with the
Cryptographic Message Syntax (CMS)", RFC 5409, January
2009.
<Zhongyuan Qin> Expires <October 2, 2015> [Page 8]
INTERNET DRAFT <IBKM> <January 29, 2015>
Authors' Addresses
Zhongyuan Qin
Southeast University
No.9, MoZhou East Street, Nan Jing, Jiang Su Province 211100
EMail: zyqin@seu.edu.cn
Jie Huang
Southeast University
No.9, MoZhou East Street, Nan Jing, Jiang Su Province 211100
EMail: jhuang@seu.edu.cn
Kerong Feng
Southeast University
No.9, MoZhou East Street, Nan Jing, Jiang Su Province 211100
EMail: fengkerong@163.com
<Zhongyuan Qin> Expires <October 2, 2015> [Page 9]