Skip to main content

LISA: LIghtweight Security Algorithm for Wireless Sensor Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4882))

Abstract

Confidentiality and authenticity are two important security services required for almost every WSN application. However, small memory, weak processor and limited battery power of the sensor nodes are the major obstacles to implement traditional security primitives in them. Owing to both, the requirement as well as the obstacles, this paper proposes a LIghtweight Security Algorithm (LISA) tailored to implement in resource restrained sensor nodes. The novelty of this scheme is that it achieves both, confidentiality and authenticity of data, without using traditional encryption algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, A.F., Su, W., Sankarasubramaniam, Y., Cayiric, E.: A survey on Sensor Networks. IEEE Communication Mag. 20, 102–114 (2002)

    Article  Google Scholar 

  2. Hill, J., Culler, D.: Mica: A wireless platform for deeply embedded networks. IEEE Micro 22(6) (2002)

    Google Scholar 

  3. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link layer security SArchitecture for Wireless Sensor Networks. In: SENSYS 2004. Proc of ACM Intl conference on Sensor networks security (2004)

    Google Scholar 

  4. Luk, M., Perrig, A., Whillock, B.: Seven Cardinal Properties of Sensor Network Broadcast Authentication. In: SASN 2006. Proc. of ACM conference on Security of Ad Hoc and Sensor Networks, pp. 147–156 (2006)

    Google Scholar 

  5. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commnication of ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  7. Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications, 38–43 (2004)

    Google Scholar 

  8. Stinson, D.R.: Cryptography theory and practice, 2nd edn. CRC Press, Boca Raton, USA (2002)

    Google Scholar 

  9. Wolfram, S.: A New kind of Sciences. Wolfram media Inc (2002)

    Google Scholar 

  10. Zheng, J., Li, J., Lee, M.J., Anshel, M.: A lightweight encryption and authentication scheme for wireless sensor networks. Int. J. Security and Networks 1(3/4) (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomasz Janowski Hrushikesha Mohanty

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tripathy, S. (2007). LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77115-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77112-8

  • Online ISBN: 978-3-540-77115-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics