Skip to main content

A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks

  • Conference paper
  • 3453 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Abstract

Many real-world scenarios require the effective enforcement of a common bulk of strong security services that nowadays Wireless Sensor Network (WSN) implementations are far from achieving. This paper introduces a new cryptographic primitive which seems very promising to achieve authentication of the nodes involved in a WSN in such usage scenarios. We show the feasibility of this primitive by showing some its remarkable features in the context of radio communications and by comparing its power consumption to those of Public-Key Certificates.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wireless LAN Security White Paper, Cisco Systems On-line Documentation (2009)

    Google Scholar 

  2. Sun Small Programmable Object Technology (Sun SPOT) - Theory of Operation, Sun Labs (2007)

    Google Scholar 

  3. Cagalj, M., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.: Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In: Proc. of the 2006 IEEE Symposium on Security and Privacy (2006)

    Google Scholar 

  4. Menezes, A., van Oorschot, P., Vanstone, S.: Hanbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    Google Scholar 

  5. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proc. of the 3rd IEEE International Conference on Pervasive Computing and Communications (2005)

    Google Scholar 

  6. Gupta, V.: Experiments with a Solar-powered Sun SPOT, Sun Labs (2009)

    Google Scholar 

  7. Roman, R., Alcaraz, C., Lopez, J.: A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Netw. Appl. 12 (2007)

    Google Scholar 

  8. Seshadri, A., Luk, M., Perrig, A.: SAKE: Software Attestation for Key Establishment in Sensor Networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 372–385. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  10. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Springer, Heidelberg (2005)

    Google Scholar 

  11. Sanzgiri, K., Dahill, B., Neil Levine, B., Shields, C., Royer, E.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of the International Conference on Network Protocols (2002)

    Google Scholar 

  12. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schmid, G., Rossi, F. (2010). A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics