Abstract
This paper presents the design and initial experimentation of a novel robot-sensor network security architecture that exploits the synergies between robots and sensor networks to provide high security level with moderate resource consumption. The robot implements security functionalities that in traditional schemes are assumed by the sensor nodes and the Base Station. In contrast to traditional sensor network security schemes, it is not sensor nodes but the robot who discovers other sensor nodes and establishes the network topology, involving important security advantages. This paper presents the design of the architecture, its main advantages and shows its validity in initial field experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shih, C.Y., Capitán, J., Marrón, P.J., Viguria, A., Alarcón, F., Schwarzbach, M., Laiacker, M., Kondak, K., Martínez-de Dios, J.R., Ollero, A.: On the Cooperation between Mobile Robots and Wireless Sensor Networks, pp. 67–86. Springer, Heidelberg (2014)
Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks - a survey. Comput. Commun. 51, 1–20 (2014)
Hegland, A.M., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials 8(3), 48–66 (2006)
Yih-Chun, H., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)
Sreedhar, C., Verma, S.M., Kasiviswanath, N.: A survey on security issues in wireless ad hoc network routing protocols. Int. J. Comput. Sci. Eng. (IJCSE) 2(2), 224–232 (2010)
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69 (2008)
Galluccio, L., Milardo, S., Morabito, G., Palazzo, S.: SDN-WISE: design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 513–521 (2015)
Olivier, F., Carlos, G., Florent, N.: SDN based architecture for clustered WSN. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 342–347. IEEE (2015)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: IEEE Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71–80 (2004)
Kim, D., An, S.: Efficient and scalable public key infrastructure for wireless sensor networks. In: The 2014 International Symposium on Networks, Computers and Communications, pp. 1–5. IEEE (2014)
Kim, D., An, S.: PKC-based dos attacks-resistant scheme in wireless sensor networks. IEEE Sens. J. 16(8), 2217–2218 (2016). https://doi.org/10.1109/JSEN.2016.2519539
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)
Kent, S., Seo, K.: Security architecture for the internet protocol. RFC 4301, RFC Editor (2005)
Dierks, T., Rescorla, E.: The transport layer security (tls) protocol version 1.2. RFC 5246, RFC Editor (2008)
Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. RFC 6347, RFC Editor (2012)
Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 2011 International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 1–8 (2011)
Perelman, V.: Security in ipv6-enabled wireless sensor networks: An implementation of tls/dtls for the contiki operating system. Ph.D. diss., MSc Thesis, Jacobs University Bremen (2012)
Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (coap). RFC 7252, RFC Editor (2014)
Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 60–69. IEEE (2007)
Wood, A., Stankovic, J., Son, S.: JAM: a jammed-area mapping service for sensor networks. In: Proceedings of the International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp. 286–297. IEEE Computer Society (2003)
Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 49–63. IEEE (2005)
Torres-González, A., Martínez-de Dios, J., Ollero, A.: Range-only SLAM for robot-sensor network cooperation. Auton. Robots (2017). https://doi.org/10.1007/s10514-017-9663-8
Acknowledgments
This work has been partially supported by EU Project AEROARMS Ref. H2020-ICT-2014-1-644271 and AEROMAIN funded by (DPI2014-59383-C2-1-R). J.R. Martínez-de Dios acknowledges EU Project EUROC (Contract 608849).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Fernández-Jiménez, F.J., Martínez-de Dios, J.R. (2018). Design of a Robot-Sensor Network Security Architecture for Monitoring Applications. In: Ollero, A., Sanfeliu, A., Montano, L., Lau, N., Cardeira, C. (eds) ROBOT 2017: Third Iberian Robotics Conference. ROBOT 2017. Advances in Intelligent Systems and Computing, vol 694. Springer, Cham. https://doi.org/10.1007/978-3-319-70836-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-70836-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70835-5
Online ISBN: 978-3-319-70836-2
eBook Packages: EngineeringEngineering (R0)