Affiliation:
1. The University of Michigan, Ann Arbor, MI
Abstract
Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance. Making such a sensor network secure is crucial to their intended applications, yet challenging due to the severe resource constraints in each sensor device. We present a
lightweight security protocol
(LiSP) that makes a tradeoff between security and resource consumption via efficient rekeying. The heart of the protocol is the novel rekeying mechanism that offers (1) efficient key broadcast without requiring retransmission/ACKs, (2) authentication for each key-disclosure without incurring additional overhead, (3) the ability of detecting/recovering lost keys, (4) seamless key refreshment without disrupting ongoing data encryption/decryption, and (5) robustness to inter-node clock skews. Furthermore, these benefits are preserved in conventional contention-based medium access control protocols that do not support reliable broadcast. Our performance evaluation shows that LiSP reduces resource consumption significantly, while requiring only three hash computations, on average, and a storage space for eight keys.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Provisioning as Integrity in wireless sensor networks (WSN): A Survey;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
2. Work energy modeling link layer protocol on TinyOS and TinySec based wireless sensor networks with LEACH method;PROCEEDINGS OF THE SYMPOSIUM ON ADVANCE OF SUSTAINABLE ENGINEERING 2021 (SIMASE 2021): Post Covid-19 Pandemic: Challenges and Opportunities in Environment, Science, and Engineering Research;2023
3. Large Sensing Data Flows Using Cryptic Techniques;Intelligent Data Analytics for Terror Threat Prediction;2021-01-15
4. Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy;Topics in Cryptology – CT-RSA 2020;2020
5. Data Storages in Wireless Sensor Networks to Deal With Disaster Management;Emergency and Disaster Management;2019