Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms

  • Conference paper
  • First Online:
Mobile Networks and Management (MONAMI 2022)

Abstract

The 6TiSCH protocol stack has been widely utilized in the industry to build highly reliable and energy efficiency wireless sensor networks (WSNs). The communication security between nodes mainly relies on the AES encryption algorithm, but the 6TiSCH protocol does not regulate the protection strategy for encryption keys in the network. Therefore, this paper proposes a hybrid ECC-AES data encryption scheme based on the 6TiSCH protocol stack. The Elliptic Curve Diffie Hellman (ECDH), Elliptic Curve Qu-Vanstone (ECQV) algorithms are used to negotiate the shared key for each two nodes in a WSN, and AES encryption with dynamic session keys are derived from the shared key during the nodes’ communication phase. Meanwhile, since the ECC algorithm is used in the resource-constrained nodes, this paper considers the influence of the underlying elliptic curve operations on the computation speed of the shared key, and proposes a regular window algorithm to accelerate the scalar multiplication operation based on previous researches. To prove the scheme’s viability, we conduct simulation experiments on the generation time of shared keys, and the experimental results prove that the encryption scheme under the regular window scalar multiplication has an impressive key generation speed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 74.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 96.29
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gardašević, G., Katzis, K., Bajić, D., et al.: Emerging wireless sensor networks and Internet of Things technologies—foundations of smart healthcare. Sensors 20(13), 3619 (2020)

    Article  Google Scholar 

  2. 15.4e-2012: IEEE Standard for Local and Metropolitan Area Networks – Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, Institute of Electrical and Electronics Engineers Std. (2012)

    Google Scholar 

  3. Vilajosana, X., et al.: Ietf 6tisch: a tutorial. IEEE Commun. Surv. Tutor. 22(1), 595–615 (2019)

    Google Scholar 

  4. 6TiSCH Homepage: https://datatracker.ietf.org/wg/6tisch/charter/. Last accessed Oct 2018

  5. Scanzio, S., et al.: Wireless sensor networks and TSCH: a compromise between reliability, power consumption, and latency. IEEE Access 8, 167042–167058 (2020)

    Article  Google Scholar 

  6. Vilajosana, X., Watteyne, T., Vučinić, M., et al.: 6TiSCH: industrial performance for IPv6 Internet-of-Things networks. Proc. IEEE 107(6), 1153–1165 (2019)

    Article  Google Scholar 

  7. Shahbazi, K., Ko, S.B.: Area-efficient nano-AES implementation for Internet-of-Things devices. IEEE Trans. Very Large Scale Integ. Syst. 29(1), 136–148 (2020)

    Google Scholar 

  8. Sajjad, S.M., Yousaf, M.: Security analysis of IEEE 802.15. 4 MAC in the context of Internet of Things (IoT). In: 2014 Conference on Information Assurance and Cyber Security (CIACS), pp. 9–14. IEEE (2014)

    Google Scholar 

  9. Tiloca, M,. Guglielmo, D.D., Dini, G., et al.: Dish: Distributed shuffling against selective jamming attack in ieee 802.15. 4e tsch networks. ACM Trans. Sensor Netw. 15(1), 1–28 (2018)

    Google Scholar 

  10. Carignani, G., Righetti, F., Vallati, C., et al.: Evaluation of feasibility and impact of attacks against the 6top protocol in 6tisch networks. In: 2020 IEEE 21st International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 68–77. IEEE (2020)

    Google Scholar 

  11. Sciancalepore, S., Piro, G., Vogli, E., et al.: On securing IEEE 802.15. 4 networks through a standard compliant framework. In: 2014 Euro Med Telco Conference (EMTC), pp. 1–6. IEEE (2014)

    Google Scholar 

  12. Pooja, C.R.K.: Triple phase hybrid cryptography technique in a wireless sensor network. Int. J. Comput. Appl. 44(2), 148–153 (2022)

    Google Scholar 

  13. Lavanya, R., Karpagam, M.: Enhancing the security of AES through small scale confusion operations for data communication. Microprocess. Microsyst. 75, 103041 (2020)

    Article  Google Scholar 

  14. Bafandehkar, M., Yasin, S.M., Mahmod, R., et al.: Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1–3. IEEE (2013)

    Google Scholar 

  15. Rivain, M.: Fast and regular algorithms for scalar multiplication over elliptic curves. Cryptology ePrint Archive (2011)

    Google Scholar 

  16. Campagna, M.: SEC 4: Elliptic curve Qu-Vanstone implicit certificate scheme (ECQV). Standards for Efficient Cryptography, Version 1 (2013)

    Google Scholar 

  17. Brown, M., Hankerson, D., López, J., et al.: Software implementation of the NIST elliptic curves over prime fields. In: Cryptographers’ Track at the RSA Conference, pp. 250–265. Springer, Berlin, Heidelberg (2001)

    Google Scholar 

  18. Gura, N., Patel, A., Wander, A., et al.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International workshop on cryptographic hardware and embedded systems, pp. 119–132. Springer, Berlin, Heidelberg (2004)

    Google Scholar 

  19. Omondi, A.R.: Cryptography arithmetic. Springer International Publishing (2020)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No.62002143 and the Natural Science Foundation of Jiangxi Province under Grant No. 20224BAB202011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, C., Yang, W., Zhang, Z., Liu, Q., **ao, J. (2023). Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms. In: Cao, Y., Shao, X. (eds) Mobile Networks and Management. MONAMI 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 474. Springer, Cham. https://doi.org/10.1007/978-3-031-32443-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-32443-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-32442-0

  • Online ISBN: 978-3-031-32443-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation