Abstract
The 6TiSCH protocol stack has been widely utilized in the industry to build highly reliable and energy efficiency wireless sensor networks (WSNs). The communication security between nodes mainly relies on the AES encryption algorithm, but the 6TiSCH protocol does not regulate the protection strategy for encryption keys in the network. Therefore, this paper proposes a hybrid ECC-AES data encryption scheme based on the 6TiSCH protocol stack. The Elliptic Curve Diffie Hellman (ECDH), Elliptic Curve Qu-Vanstone (ECQV) algorithms are used to negotiate the shared key for each two nodes in a WSN, and AES encryption with dynamic session keys are derived from the shared key during the nodes’ communication phase. Meanwhile, since the ECC algorithm is used in the resource-constrained nodes, this paper considers the influence of the underlying elliptic curve operations on the computation speed of the shared key, and proposes a regular window algorithm to accelerate the scalar multiplication operation based on previous researches. To prove the scheme’s viability, we conduct simulation experiments on the generation time of shared keys, and the experimental results prove that the encryption scheme under the regular window scalar multiplication has an impressive key generation speed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gardašević, G., Katzis, K., Bajić, D., et al.: Emerging wireless sensor networks and Internet of Things technologies—foundations of smart healthcare. Sensors 20(13), 3619 (2020)
15.4e-2012: IEEE Standard for Local and Metropolitan Area Networks – Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, Institute of Electrical and Electronics Engineers Std. (2012)
Vilajosana, X., et al.: Ietf 6tisch: a tutorial. IEEE Commun. Surv. Tutor. 22(1), 595–615 (2019)
6TiSCH Homepage: https://datatracker.ietf.org/wg/6tisch/charter/. Last accessed Oct 2018
Scanzio, S., et al.: Wireless sensor networks and TSCH: a compromise between reliability, power consumption, and latency. IEEE Access 8, 167042–167058 (2020)
Vilajosana, X., Watteyne, T., Vučinić, M., et al.: 6TiSCH: industrial performance for IPv6 Internet-of-Things networks. Proc. IEEE 107(6), 1153–1165 (2019)
Shahbazi, K., Ko, S.B.: Area-efficient nano-AES implementation for Internet-of-Things devices. IEEE Trans. Very Large Scale Integ. Syst. 29(1), 136–148 (2020)
Sajjad, S.M., Yousaf, M.: Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT). In: 2014 Conference on Information Assurance and Cyber Security (CIACS), pp. 9–14. IEEE (2014)
Tiloca, M,. Guglielmo, D.D., Dini, G., et al.: Dish: Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks. ACM Trans. Sensor Netw. 15(1), 1–28 (2018)
Carignani, G., Righetti, F., Vallati, C., et al.: Evaluation of feasibility and impact of attacks against the 6top protocol in 6tisch networks. In: 2020 IEEE 21st International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 68–77. IEEE (2020)
Sciancalepore, S., Piro, G., Vogli, E., et al.: On securing IEEE 802.15. 4 networks through a standard compliant framework. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–6. IEEE (2014)
Pooja, C.R.K.: Triple phase hybrid cryptography technique in a wireless sensor network. Int. J. Comput. Appl. 44(2), 148–153 (2022)
Lavanya, R., Karpagam, M.: Enhancing the security of AES through small scale confusion operations for data communication. Microprocess. Microsyst. 75, 103041 (2020)
Bafandehkar, M., Yasin, S.M., Mahmod, R., et al.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2013)
Rivain, M.: Fast and regular algorithms for scalar multiplication over elliptic curves. Cryptology ePrint Archive (2011)
Campagna, M.: SEC 4: Elliptic curve Qu-Vanstone implicit certificate scheme (ECQV). Standards for Efficient Cryptography, Version 1 (2013)
Brown, M., Hankerson, D., López, J., et al.: Software implementation of the NIST elliptic curves over prime fields. In: Cryptographers’ Track at the RSA Conference, pp. 250–265. Springer, Berlin, Heidelberg (2001)
Gura, N., Patel, A., Wander, A., et al.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems, pp. 119–132. Springer, Berlin, Heidelberg (2004)
Omondi, A.R.: Cryptography arithmetic. Springer International Publishing (2020)
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grant No.62002143 and the Natural Science Foundation of Jiangxi Province under Grant No. 20224BAB202011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hou, C., Yang, W., Zhang, Z., Liu, Q., **ao, J. (2023). Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms. In: Cao, Y., Shao, X. (eds) Mobile Networks and Management. MONAMI 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32443-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-32443-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-32442-0
Online ISBN: 978-3-031-32443-7
eBook Packages: Computer ScienceComputer Science (R0)