Skip to main content

Design of a Robot-Sensor Network Security Architecture for Monitoring Applications

  • Conference paper
  • First Online:
ROBOT 2017: Third Iberian Robotics Conference (ROBOT 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 694))

Included in the following conference series:

  • 2523 Accesses

Abstract

This paper presents the design and initial experimentation of a novel robot-sensor network security architecture that exploits the synergies between robots and sensor networks to provide high security level with moderate resource consumption. The robot implements security functionalities that in traditional schemes are assumed by the sensor nodes and the Base Station. In contrast to traditional sensor network security schemes, it is not sensor nodes but the robot who discovers other sensor nodes and establishes the network topology, involving important security advantages. This paper presents the design of the architecture, its main advantages and shows its validity in initial field experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shih, C.Y., Capitán, J., Marrón, P.J., Viguria, A., Alarcón, F., Schwarzbach, M., Laiacker, M., Kondak, K., Martínez-de Dios, J.R., Ollero, A.: On the Cooperation between Mobile Robots and Wireless Sensor Networks, pp. 67–86. Springer, Heidelberg (2014)

    Google Scholar 

  2. Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks - a survey. Comput. Commun. 51, 1–20 (2014)

    Article  Google Scholar 

  3. Hegland, A.M., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Commun. Surv. Tutorials 8(3), 48–66 (2006)

    Article  Google Scholar 

  4. Yih-Chun, H., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2(3), 28–39 (2004)

    Article  Google Scholar 

  5. Sreedhar, C., Verma, S.M., Kasiviswanath, N.: A survey on security issues in wireless ad hoc network routing protocols. Int. J. Comput. Sci. Eng. (IJCSE) 2(2), 224–232 (2010)

    Google Scholar 

  6. McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69 (2008)

    Article  Google Scholar 

  7. Galluccio, L., Milardo, S., Morabito, G., Palazzo, S.: SDN-WISE: design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. In: IEEE Conference on Computer Communications (INFOCOM), pp. 513–521 (2015)

    Google Scholar 

  8. Olivier, F., Carlos, G., Florent, N.: SDN based architecture for clustered WSN. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 342–347. IEEE (2015)

    Google Scholar 

  9. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  10. Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: IEEE Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71–80 (2004)

    Google Scholar 

  11. Kim, D., An, S.: Efficient and scalable public key infrastructure for wireless sensor networks. In: The 2014 International Symposium on Networks, Computers and Communications, pp. 1–5. IEEE (2014)

    Google Scholar 

  12. Kim, D., An, S.: PKC-based dos attacks-resistant scheme in wireless sensor networks. IEEE Sens. J. 16(8), 2217–2218 (2016). https://doi.org/10.1109/JSEN.2016.2519539

    Article  Google Scholar 

  13. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  14. Kent, S., Seo, K.: Security architecture for the internet protocol. RFC 4301, RFC Editor (2005)

    Google Scholar 

  15. Dierks, T., Rescorla, E.: The transport layer security (tls) protocol version 1.2. RFC 5246, RFC Editor (2008)

    Google Scholar 

  16. Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2. RFC 6347, RFC Editor (2012)

    Google Scholar 

  17. Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 2011 International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 1–8 (2011)

    Google Scholar 

  18. Perelman, V.: Security in ipv6-enabled wireless sensor networks: An implementation of tls/dtls for the contiki operating system. Ph.D. diss., MSc Thesis, Jacobs University Bremen (2012)

    Google Scholar 

  19. Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (coap). RFC 7252, RFC Editor (2014)

    Google Scholar 

  20. Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 4th Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 60–69. IEEE (2007)

    Google Scholar 

  21. Wood, A., Stankovic, J., Son, S.: JAM: a jammed-area mapping service for sensor networks. In: Proceedings of the International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp. 286–297. IEEE Computer Society (2003)

    Google Scholar 

  22. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 49–63. IEEE (2005)

    Google Scholar 

  23. Torres-González, A., Martínez-de Dios, J., Ollero, A.: Range-only SLAM for robot-sensor network cooperation. Auton. Robots (2017). https://doi.org/10.1007/s10514-017-9663-8

Download references

Acknowledgments

This work has been partially supported by EU Project AEROARMS Ref. H2020-ICT-2014-1-644271 and AEROMAIN funded by (DPI2014-59383-C2-1-R). J.R. Martínez-de Dios acknowledges EU Project EUROC (Contract 608849).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francisco J. Fernández-Jiménez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fernández-Jiménez, F.J., Martínez-de Dios, J.R. (2018). Design of a Robot-Sensor Network Security Architecture for Monitoring Applications. In: Ollero, A., Sanfeliu, A., Montano, L., Lau, N., Cardeira, C. (eds) ROBOT 2017: Third Iberian Robotics Conference. ROBOT 2017. Advances in Intelligent Systems and Computing, vol 694. Springer, Cham. https://doi.org/10.1007/978-3-319-70836-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70836-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70835-5

  • Online ISBN: 978-3-319-70836-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics