Abstract
A Wireless Sensor Network (WSN) is a versatile and distributed sensing system that is able to support a wide variety of application domains. One of the most important issue in WSN design is to guarantee the reliability of the collected data which involves in turn security issues across wireless links. This paper deals with the cryptographic aspects in the broader field of security in WSNs. In particular, moving from some previous advances in our research activity, this manuscript proposes a novel cryptographic scheme that is compliant to security requirements that may arise from real-world WSN applications and reports some details about an implementation in TinyOS that we have carried for experimental validation. The proposed scheme, called TAKS2, exploits benefits from Hybrid Cryptography to handle resource constraints and allows to generate topology authenticated keys to provide increased robustness to the scheme itself.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abbasi, A.A., Younis, M.: A Survey on Clustering Algorithms for Wireless Sensor Networks. Computer Communications 30 (2007)
Agilla Home Page, http://mobilab.wustl.edu/projects/agilla/
Blom, R.: An optimal class of symmetric key generation systems. Eurocrypt 84 (1985)
Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Techical Report TR-05-07, Troy (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy (2003)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004) ISBN 0-387-95273-X
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, USA, pp. 93–104 (November 2000)
Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems, LARTES (2002)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)
Menezes, A.J., Van Oorschot, P., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)
Vlajic, N., Xia, D.: Wireless Sensor Networks: To Cluster or Not To Cluster? In: Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Buffalo (2006)
Pugliese, M., Giani, A., Santucci, F.: A Weak Process Approach to Anomaly Detection in Wireless Sensor Networks. In: First International Workshop on Sensor Networks, SN 2008 (2008)
Pugliese, M., Pomante, L., Santucci, F.: Agent-based Scalable Design of a Cross-Layer Security Framework for Wireless Sensor Networks Monitoring Applications. In: Proceedings of the International Workshop on Scalable Ad Hoc and Sensor Networks (SASN 2009), Saint Petersburg (2009)
Pugliese, M., Pomante, L., Santucci, F.: Secure Platform over Wireless Sensor Networks. INTECH Publishers (2012) ISBN 978-953-51-0218-2
Pugliese, M., Santucci, F.: Pair-wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks using Vector Algebra. In: 4th IEEE International Workshop on Wireless Sensor Networks Security (WSNS 2008), Atlanta (2008)
Pugliese, M., Pomante, L., Santucci, F.: Topology Optimization and Network Deployment Algorithm in WSNs for Mobile Agent-based Applications. In: 4th European Modelling Symposium, EMS 2010 (2010)
Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004)
TinyOS Home Page, http://www.tinyos.net
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM 2005), Washington, pp. 324–328 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Marchesani, S., Pomante, L., Pugliese, M., Santucci, F. (2013). Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks. In: Zuniga, M., Dini, G. (eds) Sensor Systems and Software. S-CUBE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 122. Springer, Cham. https://doi.org/10.1007/978-3-319-04166-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-04166-7_4
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04165-0
Online ISBN: 978-3-319-04166-7
eBook Packages: Computer ScienceComputer Science (R0)