LiSP

Author:

Park Taejoon1,Shin Kang G.1

Affiliation:

1. The University of Michigan, Ann Arbor, MI

Abstract

Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance. Making such a sensor network secure is crucial to their intended applications, yet challenging due to the severe resource constraints in each sensor device. We present a lightweight security protocol (LiSP) that makes a tradeoff between security and resource consumption via efficient rekeying. The heart of the protocol is the novel rekeying mechanism that offers (1) efficient key broadcast without requiring retransmission/ACKs, (2) authentication for each key-disclosure without incurring additional overhead, (3) the ability of detecting/recovering lost keys, (4) seamless key refreshment without disrupting ongoing data encryption/decryption, and (5) robustness to inter-node clock skews. Furthermore, these benefits are preserved in conventional contention-based medium access control protocols that do not support reliable broadcast. Our performance evaluation shows that LiSP reduces resource consumption significantly, while requiring only three hash computations, on average, and a storage space for eight keys.

Publisher

Association for Computing Machinery (ACM)

Subject

Hardware and Architecture,Software

Reference50 articles.

1. Bass T. 2000. Intrusion detection systems and multisensor data fusion. Commun. ACM.]] 10.1145/332051.332079 Bass T. 2000. Intrusion detection systems and multisensor data fusion. Commun. ACM.]] 10.1145/332051.332079

2. Bonnet P. Gehrke J. and Seshadri P. 2001. Towards sensor database systems. In Mobile Data Management (MDM&01) Hong Kong China.]] Bonnet P. Gehrke J. and Seshadri P. 2001. Towards sensor database systems. In Mobile Data Management (MDM&01) Hong Kong China.]]

3. Intercepting mobile communications

Cited by 43 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Security Provisioning as Integrity in wireless sensor networks (WSN): A Survey;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06

2. Work energy modeling link layer protocol on TinyOS and TinySec based wireless sensor networks with LEACH method;PROCEEDINGS OF THE SYMPOSIUM ON ADVANCE OF SUSTAINABLE ENGINEERING 2021 (SIMASE 2021): Post Covid-19 Pandemic: Challenges and Opportunities in Environment, Science, and Engineering Research;2023

3. Large Sensing Data Flows Using Cryptic Techniques;Intelligent Data Analytics for Terror Threat Prediction;2021-01-15

4. Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy;Topics in Cryptology – CT-RSA 2020;2020

5. Data Storages in Wireless Sensor Networks to Deal With Disaster Management;Emergency and Disaster Management;2019

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3