Abstract
Many real-world scenarios require the effective enforcement of a common bulk of strong security services that nowadays Wireless Sensor Network (WSN) implementations are far from achieving. This paper introduces a new cryptographic primitive which seems very promising to achieve authentication of the nodes involved in a WSN in such usage scenarios. We show the feasibility of this primitive by showing some its remarkable features in the context of radio communications and by comparing its power consumption to those of Public-Key Certificates.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Wireless LAN Security White Paper, Cisco Systems On-line Documentation (2009)
Sun Small Programmable Object Technology (Sun SPOT) - Theory of Operation, Sun Labs (2007)
Cagalj, M., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., Srivastava, M., Hubaux, J.: Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In: Proc. of the 2006 IEEE Symposium on Security and Privacy (2006)
Menezes, A., van Oorschot, P., Vanstone, S.: Hanbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proc. of the 3rd IEEE International Conference on Pervasive Computing and Communications (2005)
Gupta, V.: Experiments with a Solar-powered Sun SPOT, Sun Labs (2009)
Roman, R., Alcaraz, C., Lopez, J.: A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes. Mobile Netw. Appl. 12 (2007)
Seshadri, A., Luk, M., Perrig, A.: SAKE: Software Attestation for Key Establishment in Sensor Networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 372–385. Springer, Heidelberg (2008)
Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Springer, Heidelberg (2005)
Sanzgiri, K., Dahill, B., Neil Levine, B., Shields, C., Royer, E.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of the International Conference on Network Protocols (2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schmid, G., Rossi, F. (2010). A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)