Abstract
One of the challenges in securing wireless sensor networks (WSNs) is the key distribution; that is, a single shared key must first be known to a pair of communicating nodes before they can proceed with the secure encryption and decryption of the data. In 1984, Blom proposed a scheme called the symmetric key generation system as one method to solve this problem. Blom’s scheme has proven to be -secure, which means that a coalition of nodes can break the scheme. In 2021, a novel and intriguing scheme based on Blom’s scheme was proposed. In this scheme, elliptic curves over a finite field are implemented in Blom’s scheme for the case when . However, the security of this scheme was not discussed. In this paper, we point out a mistake in the algorithm of this novel scheme and propose a way to fix it. The new fixed scheme is shown to be applicable for arbitrary . The security of the proposed scheme is also discussed. It is proven that the proposed scheme is also -secure with a certain condition. In addition, we also discuss the application of this proposed scheme in distributed ledger technology (DLT).
1. Introduction
A wireless sensor network (WSN) is a network that consists of sensors as nodes, and these sensors are connected to each other wirelessly. Privacy and security are humongous challenges in WSNs. It is no doubt important to create security mechanisms that are customized for WSNs [1].
Cryptography is one security mechanism. However, Gaubatz et al. in [2] mentioned that public-key cryptography is much more complex, requiring more memory and storage, and being both slower and a greater drainer of energy. These characteristics make public-key cryptography unsuitable to be used in most energy-constrained environments, such as WSNs.
In contrast, symmetric key cryptography methods are said to be more resource-efficient, and this makes them preferred for use in WSNs [1]. On the other hand, there are special cases where developers implement the public-key cryptography as a security mechanism, such as RSA [3] and elliptic curve cryptography [4] in resource-constrained sensors.
However, symmetric cryptography has a major disadvantage, which is the problem of key distribution; that is, the shared single key must first be known to the pair of communicating nodes before they can proceed with the secure encryption and decryption of the data [1].
The security of WSNs depends on the effective key distribution, which should be resistant to attacks [5]. Designing an effective key distribution scheme for a WSN is a challenging task due to the constraints on sensors such as energy, computation capability, and memory [6]. If the key distribution scheme is not able to distribute the keys among sensor nodes in a WSN, then the entire WSN communication may be prone to attacks [7].
Key pre-distribution schemes are suitable to be implemented in WSNs to solve the key distribution problem [5,8]. In a key pre-distribution scheme, an offline trusted third-party installs a set of secret information in each node before the deployment of the nodes to their fields. After the deployment, the sensor nodes use the installed information to compute their common keys [5,8].
Consistent with this, in 1984, a famous key pre-distribution scheme, known as Blom’s scheme, was developed [9]. Let be any positive integer. Blom’s scheme is shown in [6] to be -secure, i.e., if at most nodes are compromised, then the whole network cannot be compromised and if nodes are compromised, then the whole network can be compromised. In 2021, Udin et al. [10] developed a novel key pre-distribution scheme, which implements elliptic curves over a finite field in Blom’s scheme. However, Udin et al. [10] only presented the algorithm of the case where did not present the security of this developed scheme.
In addition to being used in WSNs, the concept of key distribution has also been implemented in the distributed ledger technology (DLT). In general, a DLT is based on three technologies, which are public key cryptography, distributed peer-to-peer networks, and consensus mechanisms [11]. Since public key cryptography is involved in DLT, key management for DLT is also important to securely distribute the keys among the nodes. Therefore, a novel key pre-distribution scheme is introduced in this paper that can be implemented in both WSN and DLT.
The objectives: This paper is based on the key pre-distribution scheme proposed in [10]. The objectives of this paper are listed below:
- We propose a modified scheme that can be used for any arbitrary ;
- We discuss and prove the security of the proposed scheme against the coalition of the sensor nodes.
Our contribution: In this paper, we propose a novel key pre-distribution scheme. Specifically, we successfully implement elliptic curves over a prime field by fixing the proposed scheme in [10], and we show that the fixed scheme is applicable for arbitrary . We also prove that the proposed scheme is -secure. Our proposed scheme has full connectivity, supports the mobility of nodes in the network, has high scalability, and uses the elliptic curves group law and scalar multiplication in the calculation instead of just adding and multiplying integers. The comparison of our proposed scheme and other existing key distribution schemes that are based on Blom’s scheme is discussed in Section 6.3. The proposed scheme is designed to be implemented in WSNs. In addition, this scheme can also be implemented in DLT.
The flow of the paper: The remainder of the paper is organized as follows: The literature review related to the proposed scheme is presented in Section 2. In Section 3, the preliminaries are covered. The proposed scheme is introduced in Section 4. The security of the proposed scheme is explained in Section 5. Lastly, Section 6 and Section 7 provide the discussion and conclusion, respectively.
2. Literature Review
In this section, several related works will be described.
2.1. Application of Blom’s Scheme in WSN
Blom [9] developed a famous symmetric matrix–base key pre-distribution scheme, which is often referred to as Blom’s scheme. In Blom’s scheme, any pair of nodes in a WSN is able to derive a pairwise secret key. In Blom’s scheme, there are two important matrices involved, which are matrix C and the symmetric matrix D, where N is the total number of nodes and is a positive integer. Both matrices are defined to be over a finite field of order q, where q is a prime power and . Blom’s scheme is briefly shown in Section 4.1.
Menezes et al. in [12] defined a key distribution scheme as -secure if, given a specified pair of users, any coalition of or fewer users (disjoint from the two), pooling their pieces, can do no better at computing the key shared by the two than a party that guesses the key without any pieces whatsoever.
By this logic, Blom’s scheme becomes a -secure scheme. In other words, in Blom’s scheme, if or less than nodes are compromised, then the system cannot be broken. Otherwise, if more than nodes are compromised, any adversaries can compute any keys of any pairs of other non-compromised nodes in the network. However, in order for Blom’s scheme to achieve the -secure property, every column of matrix C must be linearly independent [13], where . It also makes sense to say that choosing a larger will imply higher security in Blom’s scheme, but a larger requires more memory and computation.
Let N be the total number of nodes. Let be the s node where . Lazos in [14] explained that the original Blom’s scheme can be translated into polynomial form. Blom’s scheme was originally proposed by Blom in matrix form, as discussed earlier. However, the translation of Blom’s scheme into polynomial form is possible. If the polynomial form of Blom’s scheme described in [14] is translated back into the original matrix form, it can be seen that matrix C is designed to be a Vandermonde matrix, as shown below.
where (p is a prime).
Reddy [15] used Blom’s scheme and proposed a method to generate matrix C. An non-binary Hadamard matrix over , where p is a prime, is constructed first, where the entries of this matrix are only 1 and . The first rows and N columns of this matrix are selected as the rows and columns of matrix C. Using this type of Hadamard matrix to generate matrix C is proven to reduce the computation overhead and storage usage to store the columns of C in sensor nodes.
Khan et al. [16] mentioned that in the original Blom’s scheme, matrix C is a generator matrix of maximum distance separable (MDS) codes, where N is the total number of nodes. A modified scheme was proposed in [16], where they used maximum rank distance (MRD) codes instead of MDS codes. Khan et al. also mentioned that in MDS codes, the matrix C has linearly independent columns where . In contrast, in MRD codes, matrix C has N linearly independent columns. Khan et al. stated that this affects the security of the system, since if MDS codes are used, then an adversary needs to only compromise nodes in order to compromise the whole network. However, if MRD codes are used, then an adversary needs to capture nodes equal to the number of linearly independent columns of matrix C. Hence, using MRD codes instead of MDS increases the security parameter from to N.
Wang et al. [17] proposed a key pre-distribution scheme based on multiple key spaces, which combines balanced incomplete block designs (BIBD) and Blom’s scheme. In [17], Wang et al. let matrix C be a Vandermonde matrix generated by using the primitive element , where , as shown below.
Wang et al. also mentioned that the base station randomly generates symmetric matrix D of size , where all of these symmetric matrices are called key spaces. Next, these key spaces are distributed to N nodes using hybrid BIBD designs. By using all of this information, two nodes establish the pairwise key in the key agreement algorithm. Wang et al. stated that this proposed scheme is also -secure, which is the same as the original Blom’s scheme.
Hussain and Ibrahem in [18] proposed an efficient pairwise key management scheme for WSNs based on Blom’s scheme. The alteration made in [18] was in the matrix C. Matrix C is generated using the circular matrix technique instead of the usual Vandermonde matrix or Hadamard matrix, as proposed in [15]. In [18], matrix C was designed using a circular matrix, and it was also proven that this method ensures that every column of matrix C is linearly independent where . In the circular matrix technique, let the columns be denoted by i and the rows by j, where and . Let be the j row and i column entry in matrix C. Hussain and Ibrahem let (mod N). Hence, by obtaining matrix C and developing the secret symmetric matrix D as defined in the original Blom’s scheme, the same Blom’s scheme algorithm is used to calculate the pairwise keys of any two nodes in the network. It was also shown that this proposed scheme consumes lower energy as compared with Blom’s scheme.
Belim and Belim [19] implemented simplex channels in Blom’s key pre-distribution scheme. By referring to the polynomial form of Blom’s scheme, as shown in [14], Belim and Belim used the function of three variables instead of the function with two variables . Here, the variable s can accept two values (1 or −1), and these two values define the direction of the information stream between two communicating nodes. In the polynomial Blom scheme, the function must be symmetric, i.e., . However, for the function in this proposed scheme, there are three requirements imposed, which are Belim and Belim [19] also proposed as a possible function to be used. This proposed scheme actually refuses the idea of symmetric polynomials in the original Blom’s scheme. In this scheme, the exchange of information becomes asymmetrical.
Udin et al. [10] proposed a modification of Blom’s scheme, which applied elliptic curves over a finite field. Instead of using the matrix representation of Blom’s scheme, Udin et al. used the polynomial representation of Blom’s scheme, as shown in [14]. However, Udin et al. only applied the proposed scheme for the case where , and the security of this proposed scheme was not discussed.
2.2. Application of Blom’s Scheme in DLT
DLT can be classified into two main categories: permissionless DLT and permissioned DLT [20]. In permissionless DLT, the nodes can participate without a specific identity and in contrast, only a set of known or identified nodes can participate in permissioned DLT [20]. Hyperledger [21] and its variation, hyperledger fabric [22] (usually called fabric), are two examples of permissioned DLT, as mentioned in [20].
In the fabric, there are generally three types of nodes involved, which are the clients, the endorsing peers, and the orderers [20,23]. A membership service provider (MSP) is in charge in the fabric for associating the nodes with cryptography identities [20]. For example, if a node desires to join a network in the fabric, then MSP will give an identity to the node and allow the node to join the network. In other words, MSP maintains the permissioned nature of the fabric.
Since the use of cryptography is crucial in maintaining the security of the communication in the fabric, the keys of the nodes in the fabric have to be properly managed. Androulaki et al. [20] stated that the tools for key management in the fabric are also part of the MSP and by default, MSP in the fabric handles standard public key infrastructure (PKI) methods [20]. Albakri et al. [23] explained that all existing key establishment schemes or key distribution schemes in DLT networks are based on PKI, which is an interactive method that requires information to be exchanged and verified between nodes in order to establish a key for secure communication. This unfortunately results in a long processing time for key establishment [23].
Therefore, Albakri et al. [23] proposed a novel key pre-distribution scheme that can be implemented specifically in the fabric. The proposed scheme in [23] uses Blom’s scheme to establish the shared keys among the nodes in the fabric. Instead of using the matrix form of Blom’s scheme, Albakri et al. used the polynomial form of Blom’s scheme, which is the same as the form that was explained by Lazos in [14].
Since the proposed scheme in [23] is based on Blom’s scheme, the data required by the nodes for key establishment are preloaded into the nodes by an offline third-party trusted authority (TA). Hence, if two nodes desire to establish a shared key to secure the communication between them, the nodes do not have to exchange or verify any information needed for key establishment, since the information was preloaded into the nodes before deployment. In other words, the pre-distribution method enables the nodes in the fabric to non-interactively establish keys with other nodes in the network. As a result, this reduces the processing time for the keys’ establishment.
In [23], Albakri et al. used three symmetric polynomials, which are where for key establishment. These polynomials are the same as the polynomial in Blom’s scheme, as described by Lazos in [14]. is used for the establishment of the shared keys between the clients and the endorsing peers, is used for the establishment of the shared keys between the clients and the orderers, and is used for the establishment of the shared keys between the orderers and the endorsing peers. Albakri et al. also mentioned that their proposed scheme is the first polynomial-based key management scheme in DLT since the key management schemes of other DLTs are based on PKI. As a result, Albakri et al. proved that their proposed scheme is faster in processing compared with other DLT key management schemes, such as public-key schemes.
The implementation of Blom’s scheme in the fabric or another permissioned DLT is a good idea since this can reduce and simplify the shared key establishment process, as proven in [23]. Another reason is that in the permissioned DLT, each node is known and given an identity before it joins the network. Therefore, the identities of the nodes can also be defined as pre-distributed information before deployment that can be used for the establishment process of the shared keys, after deployment using Blom’s scheme.
3. Preliminaries
In this section, the preliminaries are discussed in order to allow us to understand and derive the next section.
3.1. Greatest Common Divisor
One important property of the greatest common divisor, as described in [24], is
Proposition 1.
If and , then .
Proposition 1 will later be used in the proofs of Theorems 4 and 5.
3.2. Elliptic Curves
In this section, we define an elliptic curve and describe a few other basic studies related to elliptic curves, as explained in [25].
Definition 1.
Let K be a field with a characteristic other than 2 and 3. An elliptic curve, E, defined over K, is the graph of an equation of the form
where . The set of points with coordinates in field L, where on E, is denoted as such that
where is a point at infinity to the elliptic curve.
The point at infinity, , is a point sitting at the top or the bottom of the -axis, and this point is the identity element in . In this paper, we work with E over a prime field, , where p is a prime and (to avoid characteristics 2 and 3). We also do not allow E to have multiple roots, i.e., we want to make sure E has three distinct roots. The discriminant of E is , and this can be shown easily since E is cubic. Therefore, it is compulsory to make sure that (mod p) if E is defined over .
Another important idea for elliptic curves over a finite field, , is that they form additive abelian finite groups with as the identity element, since this satisfies the group axioms [25]. Therefore, the order of is the number of points on E denoted as , and the order of point P, such that is the smallest integer such that .
In Section 4.2, we explore the scalar multiplication on elliptic curves over a finite field. Theorem 1 below was described in [26] and is essential in proving Theorem 3.
Theorem 1.
Let G be a finite group.
- 1.
- Let H be any subgroup of G. The order of H divides the order of G;
- 2.
- Let . The order of g divides the order of G.
3.3. Lagrange Interpolation Polynomial
In the proof of Theorem 4, we will use the bivariate Lagrange interpolation. Before that, let us take a look at the Lagrange interpolation polynomial, as explained in [27], in Theorem 2.
Theorem 2.
Let
be points, such that is distinct for and is a value corresponding to . A unique polynomial of degree at most n exists with
This polynomial is given by
4. Materials and Methods
In this section, we first briefly present the original Blom scheme and the alteration of Blom’s scheme made in [10] in Section 4.1. We also present Theorem 3 in Section 4.2, which plays a crucial role in proving the security of the proposed scheme. The proposed scheme and an example are shown in Section 4.3 and Section 4.4, respectively.
4.1. Blom’s Key Pre-Distribution Scheme
As explained in [9,12,13], Blom’s original scheme is described here. Let N be the total number of sensor nodes in the WSN. Let be a positive integer. is also an indicator such that as long as not more than nodes are compromised, the network is perfectly secure (we call this the -secure property).
- Before the deployment of the sensor nodes, an offline key distribution center will first construct a matrix C over a finite field of order q, where q is a prime power and . Matrix C is publicly known, which means any sensors and adversaries are allowed to know C. Let be the column of matrix C, where . Note that is a -tuple over . Column is assigned to node .
- Then, the key distribution center will create a random symmetric matrix D over . Matrix D must be kept secret, which means any sensors and adversaries are not allowed to know D.
- The key distribution center will compute an matrix M such that , where is the transpose of .
- Let be the i row of matrix M, where . Note that is a -tuple over . The key distribution center will then give to node over a secure channel.
- Let us say node wants to communicate with node . Both will compute the same key, as follows:
- Node will compute , which we call . Note that is a single element in .
- Node will compute , which we call . Note that is a single element in .
Note that is the entry of matrix K where and is the entry of matrix K. Note that K is a symmetric matrix, since
Since K is symmetric, it is clear that . Therefore, node and node have computed the same key.
Udin et al. [10] proposed a scheme based on Blom’s scheme for the case . Let N be the total number of nodes. Let be the s node where . If the scheme proposed in [10] is translated back into matrix form, it can be seen that the points of the elliptic curve over a finite field (or ) can be defined as the entries in the symmetric matrix D, and matrix C was defined as a Vandermonde matrix, as shown below
where and is distinct where p is the prime used in the prime field , in which the elliptic curve has been defined. represent the public key of node , respectively. In this paper, we studied Blom’s scheme and the scheme proposed in [10]. We proposed a modified scheme that can be applied to all positive integers , and the security of the scheme for arbitrary was also discussed. We modified the second-row entries in the Vandermonde matrix to be over modulo , which is the number of points in or the order of instead of the integers modulo p, . This is because in order to prove the security of this proposed scheme, the calculation over modulo has to be made instead of modulo p. The modified scheme was proposed in polynomial form as shown in [14] instead of in matrix form. In proving the security of the modified scheme, we used the bivariate Lagrange interpolation polynomial to calculate the secret polynomial to show that the coalition of nodes can break the scheme. The univariate Lagrange interpolation polynomial is shown in Theorem 2. Based on this univariate Lagrange interpolation, we managed to derive the bivariate Lagrange interpolation that was used in proving Theorem 4.
4.2. Scalar Multiplication on Elliptic Curves over Finite Field
When discussing the security of the proposed scheme, the scalars of points on E can be reduced to modulo , i.e., the order of . This result comes from Theorem 3.
Theorem 3.
Let E be an elliptic curve over a finite field, , and the order of be n, where n can be prime or composite. Let . If for integers a and b, then .
Proof of Theorem 3.
Let m be the order of P. We also know from Theorem 1 that , and this implies for some integer k. Since , , and this implies for some integer h. Hence,
□
4.3. Proposed Algorithm for Arbitrary
The proposed algorithm for arbitrary is shown in this section. The notations used for this scheme are listed in Table 1 below.
Table 1.
Notations used in the proposed scheme.
The algorithm of the proposed scheme for arbitrary is shown below:
- 1.
- Let p be a prime greater than 3, and p is publicly known to all. Let N be the total number of nodes. Let be the s node where . The trusted authority (TA) chooses an elliptic curve E over prime field such thatwhere and (mod p). The elliptic curve is known publicly. Let be the set of points on E such thatwhere is a point at infinity to the elliptic curve. Let be the number of elements in , and note that can be either a prime or a composite. It is compulsory to make sure that , because each node must be given a distinct public key, where these public keys are elements in the integer modulo .
- 2.
- is the set of integers modulo . TA selects an element for node , which is also made public such that for .
- 3.
- Let . For , the TA chooses random points where such that and forms the polynomialThe chosen and the polynomial f above are privately known only by the TA. The polynomial f is symmetric, i.e., . The number of points to be chosen by the TA depends on the value of , where
- 4.
- For each node , the TA computesThe TA then privately sends to node over a secure channel. Note that node only knows and does not know the coefficients . is privately known only by the TA and node . Note that the scalar of each point can be reduced to modulo based on Theorem 3.
- 5.
- If two nodes, and , want to communicate with each other, they individually compute the common key (shared key), (the same as ), where node computesand node computesNote that .
4.4. Example for
Let N be the total number of nodes. Let be the s node where . Let us say that there are three nodes, namely , , and .
- 1.
- Let and p be publicly known to all. TA chooses an elliptic curve E over prime field such thatwhere (mod 11). The elliptic curve is known publicly. Let be the set of points on E.
- 2.
- Note that , which is a prime. TA selects an element for node , which is also made public such that for , as shown below.
- 3.
- Let . For , the TA chooses random points where such that , as shown below.The TA then forms the secret polynomial , as shown below.
- 4.
- For node , the TA computesFor node , the TA computesFor node , the TA computesThe TA then privately sends , , and to nodes , and , respectively, over a secure channel. Note that the scalar of each point can be reduced to modulo based on Theorem 3.
- 5.
- If and want to communicate with each other, they individually compute the common key (shared key), (the same as ), where node computesand node computesNote that .
Let us say that an adversary wants to attack this scheme. We conjecture that a coalition of will break the scheme and the secret polynomial can be obtained by the adversary. Assume that the adversary has compromised node , node , and node . By compromising , and , the adversary obtains
The adversary then uses the bivariate Lagrange interpolation polynomial as shown on the next page. Note that the scalars can be reduced to modulo .
which is exactly the same as the original . Thus, the adversary can compute any keys of any pairs of nodes by using .
5. Results
As we have seen from the examples in the previous section, can be either prime or composite, and this depends on the elliptic curve E chosen. We also restrict the public key for each user , which is denoted by , in that it must be an integers modulo , i.e., . If an adversary compromises nodes, the adversary can use the bivariate Lagrange interpolation polynomial to derive the secret polynomial . In the interpolation calculation, the adversary must reduce the scalars of points to modulo in order to obtain the polynomial . As we have seen in the example in Section 4.4, the adversary manages to obtain since is a prime. However, for the case where is a composite, some inverses of the scalars of the points modulo might not exist, and an adversary might not able to derive in the bivariate Lagrange’s interpolation. We provide the theorems in this section to discuss the security of the proposed scheme.
Theorem 4.
Let E be an elliptic curve over a prime field, , chosen for the proposed scheme, where is the set of all points on the elliptic curve E. Let N be the total number of nodes. Let be the s node where . Let be the public key of node such that no two public keys are the same. If users, namely , are compromised, and
where , then the adversary can derive the secret polynomial , and can thus calculate any pairwise keys of any non-compromised nodes.
Proof of Theorem 4.
Assume that users, namely , are compromised. Let be distinct elements in and be polynomials in . These polynomials are of degree at most , and not necessarily distinct. Now, we have a set of data points
We find a polynomial that satisfies the data points above by using the bivariate Lagrange interpolation polynomial. Let
where
for .
Note that, given the initial assumption that no two are the same, when and also
where . By Proposition 1, we know that
for all . Hence, the inverse of
always exists. Therefore, the proposed expression is always well-defined.
In , there are factors in the product, and each factor contains one y. is a polynomial of degree at most in x for all j. Therefore, , which is a sum of these -degree polynomials in both x and y, must be a polynomial of degree at most in both x and y.
Now, we want to show that for . Substituting into , we obtain
Since the product omits the term where , if , then all terms that appear are
Furthermore, if , then one of the terms (where ) in the product will be
This causes the entire product to become zero. Therefore,
where is the Kronecker delta. Hence, we may conclude that
By now, we know that is a polynomial of degree at most in both x and y, where for .
Now, we show that is unique. Note that x is a free variable. Therefore, x can be any constant. Let x be a constant c. Let there be another interpolating polynomial of the degree, at most in y, where . Assume that . Note that for .
Let . It follows that when for . This implies that has zeros. However, is of the degree, at most, in y, and by the fundamental theorem of algebra, it can have at most zeros. We arrive at a contradiction. Therefore, . The polynomial is unique. Hence, the polynomial is unique.
In the proposed scheme, the TA constructs a polynomial of degree at most in both x and y and for . By the uniqueness of the bivariate Lagrange interpolating polynomial, the interpolating polynomial must be the same as the polynomial constructed by the TA. □
Theorem 5.
Let E be an elliptic curve over a prime field, , chosen for the proposed scheme, where is the set of all points on the elliptic curve E. Let N be the total number of nodes. Let be the s node where . Let be the public key of node such that no two public keys are the same. If at most λ users, namely , are compromised, where and
where , then the adversary cannot derive the secret polynomial and, hence, any pairwise keys of any non-compromised nodes cannot be calculated by the adversary.
Proof of Theorem 5.
Let k be the number of compromised nodes, where . Let an adversary compromise a set of k nodes, namely . Therefore the adversary has a set of k points
such that
for .
Let be the real shared key of non-compromised nodes and , and the adversary wants to calculate this key. Let be the key conjectured by the adversary.
The adversary then defines the polynomial as follows
Since
where , by Proposition 1, we know that
Therefore, the inverse of
always exists. Hence, the proposed is well-defined. Note that has the same properties as , as shown below:
- is symmetric, i.e., ;
- For , it holds that ;
- has a degree of at most in both x and y, since has a degree of at most in both x and y and
Note also
Therefore, any values of would eventually be consistent with the information that the adversary holds. For any possible value of the key, , there is a symmetric polynomial that satisfies all three properties listed above, which are satisfied by the actual polynomial . Thus, if the adversary compromises at most nodes, the adversary cannot derive the secret polynomial . □
Theorem 6.
Let E be an elliptic curve over a prime field, , chosen for the proposed scheme, where is the set of all points on the elliptic curve E. Let N be the total number of nodes. Let be the s node where . Let be the public key of user , such that no two public keys are the same. If
where , then the proposed scheme is λ-secure.
Proof of Theorem 6.
Given that
where , by Theorem 4 and Theorem 5, it is clear that the proposed scheme is -secure. □
6. Discussion
In this section, we discuss the possibility of applying our proposed scheme in DLT, acknowledging the pros and cons of the proposed scheme, and provide a comparison of the proposed scheme with several other related schemes.
6.1. The Application of the Proposed Scheme in Hyperledger Fabric DLT
In Section 2.2, we reviewed the key pre-distribution scheme proposed by Albakri et al. in [23]. By comparing the scheme proposed in this paper with the scheme proposed by Albakri et al., the obvious difference between these two can be seen from the coefficients of the polynomial . The coefficients in the three polynomials in the scheme proposed by Albakri et al. are the usual integers modulo p, where p is a prime, whereas the coefficients in the polynomial in our proposed scheme are basically points on elliptic curves over a prime field. In our scheme, it is also possible for us to generate three polynomials by using a single elliptic curve over a prime field or three different elliptic curves over a prime field. Therefore, our proposed scheme is also possible to be implemented in the fabric. If our proposed scheme can be implemented in the fabric, then there exists the possibility that our scheme can be implemented in other DLT types as well, such as other variations of Hyperledger, i.e., Burrow, Indy, Sawtooth, and many more.
6.2. The Pros and Cons
All key distribution schemes have their own advantages and weaknesses. In this section, we discuss the pros and cons of our proposed scheme.
The advantages:
- 1.
- The proposed scheme has high connectivity, which means all nodes in the network are able to compute the shared keys among each other. In other words, the probability of sharing keys between nodes is 1.
- 2.
- The proposed scheme has high scalability, which means our proposed scheme can be used in networks with a huge number of nodes.
- 3.
- The proposed scheme supports the mobility of a node as long as the identities or the public keys of the new neighboring nodes are already stored in the moving node.
- 4.
- The information needed to establish the shared keys are stored in the nodes before deployment by an offline TA. Therefore, an adversary cannot attack the TA to obtain the secret polynomial and the information required to compute the shared keys.
- 5.
- Elliptic curves are used in the proposed scheme, which increases the complexity of the calculation. Scalar multiplication and the group law of elliptic curves are implemented, instead of just adding and multiplying integers.
- 6.
- This scheme can be implemented in WSNs, and also possibly in DLT technology, as discussed earlier.
The disadvantages:
- 1.
- The proposed scheme does not support the flexibility requirement. In other words, if our proposed scheme is implemented in a network, then new joining nodes cannot simply join the network, since the identities or the public keys of the new nodes were not distributed in the existing nodes before deployment.
- 2.
- The proposed scheme is not secure against the capture of nodes. However, Albakri et al. [23] mentioned that there are several security mechanisms that can be utilized to eliminate this problem, such as tamper-proof mechanisms to protect the information in the nodes from an attacker, even if the attacker captures the nodes.
6.3. The Comparison of the Proposed Scheme with Other Existing Schemes
Before we proceed to the comparison, let us understand these key management requirements, shown in Table 2, as stated by Kandi et al. in [28].
Table 2.
Key management requirements.
Next, in Table 3, we compare our proposed scheme with other key distribution schemes that are based on Blom’s scheme.
Table 3.
Comparison of the proposed scheme with existing work.
7. Conclusions
In this paper, a key pre-distribution scheme is proposed that can be used in WSNs. The proposed scheme implements elliptic curves over a prime field in Blom’s scheme, and is also based on the scheme that was introduced by Udin et al. in [10]. The proposed scheme is shown to be applicable for an arbitrary positive integer and is proven to be -secure (the same as the original Blom scheme), with the condition that
where . However, if is a prime, then the condition above is automatically fulfilled.
In the proposed scheme, the probability of sharing keys between nodes is 1, the mobility of the nodes is supported as long as the nodes are still in the network, and the scheme is also applicable for huge networks. Unfortunately, this scheme does not support the flexibility requirement. In addition, the proposed scheme can also be applied in DLT technology, such as fabric.
In future research, the proposed scheme can be improved further. To satisfy the flexibility requirement, our scheme can be combined with a balanced incomplete block design (BIBD) as implemented by Wang et al. in [17]. Another possibility is that our scheme can apply the maximum rank distance (MRD) codes instead of the maximum distance separable (MDS). Furthermore, to protect the information in the captured nodes from the adversary, we can apply tamper-proof mechanisms in our scheme, as suggested in [23]. Finally, the implementation of our scheme in DLT can be studied further. We showed that our proposed scheme can be implemented in the fabric, and we believe that the proposed scheme can also be implemented in other types of DLT. This research should focus on permissioned DLT instead of permissionless DLT since in our scheme, the identities of the nodes in the network are important to the generation of the shared keys.
Author Contributions
Conceptualization, M.F.A.B. and S.N.F.M.A.A.; methodology, M.F.A.B. and S.N.F.M.A.A.; validation, M.F.A.B. and S.N.F.M.A.A.; writing—original draft preparation, M.F.A.B.; writing—review and editing, S.N.F.M.A.A.; project administration, S.N.F.M.A.A.; funding acquisition, S.N.F.M.A.A.; supervision, S.N.F.M.A.A.; resources, M.F.A.B. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Universiti Sains Malaysia under the short-term grant 391 scheme, project number 304/PMATHS/6315553.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
We are very grateful to Hailiza Kamarulhaili for the insight and to Universiti Sains Malaysia for facilitating access to the resources used in this research.
Conflicts of Interest
The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
| WSN | wireless sensor network |
| TA | trusted authority |
| DLT | distributed ledger technology |
| MSP | membership service provider |
| MRD | maximum rank distance |
| MDS | maximum distance separable |
| PKI | public key infrastructure |
References
- Dargie, W.; Poellabauer, C. Fundamentals of Wireless Sensor Networks: Theory and Practice, 1st ed.; John Wiley & Sons Ltd.: West Sussex, UK, 2010; ISBN 978-0-470-99765-9. [Google Scholar]
- Gaubatz, G.; Kaps, J.-P.; Sunar, B. Public key cryptography in sensor networks–revisited. In Proceedings of the Security in Ad-hoc and Sensor Networks, Heidelberg, Germany, 6 August 2004; pp. 2–18. [Google Scholar]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public–key cryptosystems. Commun. ACM 1983, 26, 96–99. [Google Scholar] [CrossRef]
- Miller, V.S. Use of Elliptic Curves in Cryptography. In Proceedings of the Advances in Cryptology—CRYPTO ’85, Santa Barbara, CA, USA, 18–22 August 1985; Lecture Notes in Computer Science. Williams, H.C., Ed.; Springer: Berlin/Heidelberg, Germany, 1985; Volume 218, pp. 417–426. [Google Scholar]
- Ahlawat, P. Key distribution and management in wsn security: A state of the art. Int. Innov. Technol. Explor. Eng. (IJITEE) 2019, 9, 462–472. [Google Scholar] [CrossRef]
- Zhang, J.; Varadharajan, V. Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 2010, 33, 63–75. [Google Scholar] [CrossRef]
- Premamayudu, B.; Rao, B.T.; Rao, K.V.; Peram, S.R. Key pre- distribution protocol for node to node for wireless sensor networks. Ann. R. Soc. Cell Biol. 2021, 25, 16769–16779. [Google Scholar]
- Dargahi, T.; Javadi, H.H.; Hosseinzadeh, M. Application-specific hybrid symmetric design of key pre–distribution for wireless sensor networks. Secur. Commun. Netw. 2015, 8, 1561–1574. [Google Scholar] [CrossRef]
- Blom, R. An optimal class of symmetric key generation systems. In Proceedings of the Advances in Cryptology EUROCRYPT 1984, Paris, France, 9–11 April 1984; Beth, T., Cot, N., Ingemarsson, I., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 1985; Volume 209, pp. 335–338. [Google Scholar]
- Udin, M.N.; Mohd Amin, F.A.; Abdul Malek, A.; Zulkifili, N.A.; Ghazali, N.A.; Mohd Ridzuwan, S.A. Implementation of Blom’s key pre-distribution scheme by using elliptic curve cryptography. Malays. J. Comput. 2021, 6, 812–822. [Google Scholar]
- El Ioini, N.; Pahl, C. A Review of Distributed Ledger Technologies. In Proceedings of the OTM 2018 Conferences, On the Move to Meaningful Internet Systems, Valletta, Malta, 22–26 October 2018; Panetto, H., Debruyne, C., Proper, H., Ardagna, C., Roman, D., Meersman, R., Eds.; Springer: Cham, Switzerland, 2018; pp. 277–288. [Google Scholar]
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography, 1st ed.; CRC Press: Boca Raton, FL, USA, 1996; ISBN 0-8493-8523-7. [Google Scholar]
- Du, W.; Deng, J.; Han, Y.S.; Varshney, P.K.; Katz, J.; Khalili, A. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 2005, 8, 228–258. [Google Scholar] [CrossRef]
- Lazos, L. ECE596C: Key Distribution. Available online: https://uweb.engr.arizona.edu/~ece596c/lazos/lectures/lecture15.pdf (accessed on 12 October 2022).
- Reddy, R.S. Key management in wireless sensor networks using a modified Blom’s scheme. arXiv 2011, arXiv:1103.5712. [Google Scholar] [CrossRef]
- Khan, E.; Gabidulin, E.; Honary, B.; Ahmed, H. Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks. J. IET Wirel. Sens. Syst. 2012, 2, 108–114. [Google Scholar] [CrossRef]
- Wang, Y.; Qin, Z.; Zhang, Q.; Wang, H.; Huang, J. A key pre- distribution scheme based on multiple key spaces in wireless sensor networks. In Proceedings of the 2014 Tenth International Conference on Computational Intelligence and Security, Kunming, China, 15–16 November 2014; pp. 652–656. [Google Scholar]
- Hussain, A.W.; Ibrahem, M.K. An efficient pairwise and group key management scheme for wireless sensor network. J. Int. J. Enhanc. Res. Sci. Technol. Eng. 2015, 4, 25–31. [Google Scholar]
- Belim, S.V.; Belim, S.Y. Implementation of simplex channels in the Blom’s keys pre-distribution scheme. J. Phys. Conf. Ser. 2019, 1210, 1–5. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Hyperledger. Available online: http://www.hyperledger.org (accessed on 29 November 2022).
- Hyperledger Fabric. Available online: http://github.com/hyperledger/fabric (accessed on 29 November 2022).
- Albakri, A.; Harn, L.; Maddumala, M. Polynomial-Based Lightweight Key Management in a Permissioned Blockchain. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 1–9. [Google Scholar]
- Summary for Greatest Common Divisor. Available online: https://www.xiangsun.org/wp-content/uploads/2013/02/gcd.pdf (accessed on 12 October 2022).
- Washington, L.C. Elliptic Curves: Number Theory and Cryptography, 2nd ed.; Chapman & Hall/CRC: Boca Raton, FL, USA, 2008; ISBN 978-1-4200-7146-7. [Google Scholar]
- Pinter, C.C. A Book of Abstract Algebra, 2nd ed.; Dover Publications, Inc.: Mineola, NY, USA, 1990; ISBN 978-0-486-47417-5. [Google Scholar]
- Burden, R.L.; Faires, J.D. Numerical Analysis, 9th ed.; Brooks/Cole, Cengage Learning: Boston, MA, USA, 2011; ISBN 978-0-538-73351-9. [Google Scholar]
- Kandi, M.A.; Kouicem, D.E.; Doudou, M.; Lakhlef, H.; Bouabdallah, A.; Challal, Y. A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices. Comput. Commun. 2022, 191, 11–25. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).