Energy/Security Scalable Mobile Cryptosystem
Total Page:16
File Type:pdf, Size:1020Kb
The 14’” IEEE 2003 International Symposium on PersonalJndoor and Mobile Radio Communication Proceedings Energy/Security Scalable Mobile Cryptosystem Qiang Huang, Hisashi Kobayashi and Bede Liu Daqing Gu and Jinyun Zhang Department of Electrical Engineering Mitsubishi Electric Research Laboratories Princeton University 201 Broadway Princeton, NJ 08544, USA Cambridge, MA 02139, USA Abstract-Time-sensitive nobile commerce is vulnerable to security requirements, or when the node is in low power message authentication delays. Significant power consumption status. For critical commercial and military applications we incurred by cryptography is another limiting factor of most propose a secure routing protocol with faulty link detection mobile devices. In this paper, we present a scalable mobile based on an efficient authentication scheme combing the use cryptosystem, which installs a group key and an elliptic curve privatelpublic key pair in each device to enable both symmetric of elliptic curve cryptography (ECC) and hash functions. key and public key cryptography. Scalable key establishment Section 4 summarizes this paper. protocols and secure routing protocols with scalable authentication are proposed to make tradeoffs between security 11. SCALABLE KEY ESTABLISHMENT and energy, according to different mobile applications. In this section, we propose three different key establishment protocols for mobile networks according to different application scenarios, the first one based on pure 1. INTRODUCTION symmetric key cryptography and suitable for toysfgames home Secure and fast transmission of sensitive digital networking, the second based on a hybrid of symmetric key information ovcr wireless channels has become increasingly and public key cryptography and designed for residential or important. The use of public key cryptography consumes a small commercial wireless network deployment, and the last significant portion of the overall system resource. The one based on pure public key cryptographic operations and computation complexity of symmetric key based operations fi targeting large industrial or military applications. negligible, but the key management for symmetric key based systcin is complicated, and is always subject to attack by Perrig et al. present to use trusted third parties to assist adversaries. node-to-node key agreement [I]. We call this’trusted third party a security manager. A security manager is granted A practical mobile cryptosystem should provide the customer flexible choices for balances between security; special capabilities to assist in provisioning link keys to other performance and power efficiency. The security requirements end mobile devices on-site. The security manager should first arc different for different information to transmit, under establish a link key with an end device before it can install link different circumstances, or with different available resources. keys into that device for secure communicating with other end For instance, a customer may wish to use a pre-installed group devices inside the mobile cluster. One way to accomplish the key to authenticate his message when the battery is low, or the initial link key establishment task is to pre-install a master key message sent in not important, while risk the security table into each device. However, mobile networks may be compromise of a node inside the group. It should also be able highly versatile, involving temporary communications to operate several different tasks for different security/energy between devices that may have never met before. Thus we requirements. For applications with a low security requirement cannot predict and install all master keys needed for devices such as toydgames automation and small home light control before they join the network, especially for large-scale network, energy efficiency is more important and we can use wireless ad hoc networks. An altemative way is to use a symmetric cipher encryption and authentication. In security shared group key [2] that is pre-loaded into each device in our sensitive deployments such as military service, oil site proposed cryptosystem. Then when two devices want to operation, and hospital monitoring, it must be able to do establish a link key, they use this group key to encrypt and asymmetric cipher operation for a stronger and scalable exchange their ephemeral key contribution data. Since the security feature. Therefore, in this paper we present a scalable group key is fixed, the trust relationship is based merely on the mobile cryptosystcm, which installs a group key and an knowledge of the other device’s extended IEEE 64-bit elliptic curve privatelpublic key pair into each device before they enter the mobile network, to enable both symmetric key address. The computation complexity and power consumption of symmetric key cryptographic operations are negligible when and public key cryptography. compared with public key schemes. However, a common group In section 2 of this paper, we propose scalable key key poses a security risk if any one device is compromised. establishment protocols in mobile network for applications Therefore, this pure symnetric key based key establishment with different security and energy requirements. Section 3 protocol in applications that require the least security presents secure routing protocols with scalable authentication protection, such as the home toyslgames automation. schemes. A group key is used to authenticate data with less This work is supponed by the New Jrney Center for Wireless mi Intemet Secunty (NJWINS) and Mitsubishi Electric Research Laboratories. 0-7803-7822-9/031$17.00 0 2003 IEEE 2755 The 14* IEEE 2003 International Symposium on Personal,lndoor and Mobile Radio Communication Proceedings The use of asymmetric keys along with digital certificates then reconstructs the public key Qu =e&, +Q,.,. If Q,; =e,, to establish individual link keys can help reduce this risk and U accepts the certificate and outputs the static key pair restrict the impact Of key compromise to the compromised (qu,Qv); otherwise it rejec-s the certificate, By repeating the node itself, rather than to all its key-sharing parties. Public-key operations are quite expensive though. In recent years, ECC very same Process, a security manager acquires its based key agreement protocols have gained popularity in certificate "1, and Static key pair (Yv,Q,). constrained mobile environments, due to the property of small The certificate generation processes for end device and key sizes. In p], we propostxi a hybrid key establishment U security manager V are performed offline and before they join protoco13 which is based On a Of and the network. When they first communicate to each other, they symmetric key operations. The motivation is to exploit the execute our hybrid key establishment protocol as below: difference in capabilities between security managers and end devices, and put the cryptographic burden where the resources 1. U and V send to each other their implicit certificates. are less constrained. End mobile devices are much more The content of the certificate is verified at the other side, battery and computational resources limited. However, the including the device identity and the validity period. If any security manager' means powered and more computational check fails, the protocol is terminated. powerful. The hybrid key establishment protocol reduces the 2. V computes the hash value H(/C,) and derives an high cost elliptic curve random point scalar multiplications at the end device side and replaces them with low cost and integer e,, from H(/C,,)following the conversion routine efficient symmetric key based operations. described in Section 4. I .3 of [5]. V then obtains Vspublic key To prevent the impersonation attack, we use certificates in Q, =e,,B, +e,, . After performing the certificate processing, our key-establishment protocol, which provide a mechanism to V can conclude that Qo is genuine, provided that U later check cryptographically to whom the public key belongs and evidences knowledge of the corresponding private key qu if the device is a legitimate member of a particular network. In our mobile cryptosystem, we use the elliptic curve implicit 3. U selects a k-bit random number cg as its link key certificate scheme [4], because of the resulting low contribution and a random 160-k bit integer r.'Ucalculates its communication complexity, which is a dominant factor for ephemeral private key d,, =H(c,, 111) and ephemeral public low bit transmission channels in sensor networks. key D,, =d,, xP, where His a cryptographic hash function to First, an ellipiic curve E defined over GF@) (where p is map a binary string to a random integer E [2,n-2]. Uverifies the characteristic of the base field) with suitable coefficients and a base point Pof large order n is selected and made public Vs certificate and obtains V's public key the same way as V to dl users. CA selects a random integer 9rr as its static does, but instead of computing Q,. directly, U computes private key, and computes the static public key @I,. =qcAxP. R=d,~Q,,=(d,,e)xB,.+d,xQ,,~. Ucan conclude that R 6 To obtain a certificate and the static private-public key pair, an calculated from genuine Q,. , provided that V later evidences end device U randomly selects a temporary key pair (g,,,G,) knowledge of the corresponding private key qv. U then and sends G,, to CA. CA verifies U's identity and the encrypts c(, by using the provably secure elliptic cure authenticity of the request received from U CA also selects a encryption [6],and sends to VE=(D,,,(c, llr)63Rz)=(Ej,e2). temporary key pair (g<.<,G<;,,)and computes the elliptic curve 4. V decrypts the received message and obtains R by point E,, = G,j +GcA,The implicit certificate lC, for U is calculating q,.xE, =qvd,,xP=d,,xQ, =R. V then computes constructed as the concatenation of CA's static public key U = ep 63 Rs , and checks if E, = H(u)x P . It yes, V gets ci, as Q,,, , the device identity ID, , the elliptic curve point B,, and the most significant k bits of U.