Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2502524.2502568acmconferencesArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

A cryptographic scheme for real-world wireless sensor networks applications

Published: 08 April 2013 Publication History

Abstract

This demo deals with the cryptographic aspect of security applied to the WSN domain. In particular, it shows in action a novel cryptographic scheme compliant to security requirements of real-world WSN applications (i.e. with very limited system resources). The proposed scheme exploits benefits from both symmetric and asymmetric ones where the keys, for each communicating node pairs, can be generated only if such nodes have been authenticated with respect to the network topology. As a main difference with respect to existing approaches, the proposed scheme doesn't rely on the pre-distribution of keys but it is based on their dynamic generation exploiting partial information stored on nodes. Then, through computationally inexpensive operations, a node can compute the decrypt/encrypt key in a single phase with no steps of setup/negotiation. Furthermore, the proposed approach allows to authenticate a message with respect to a set of planned network topologies. For this, it has been called TAK2 (Topology Authenticated Key 2, i.e. an improvement of [1]). TAK2 has been implemented in nesC/TinyOS_1.x [2]. In particular, TAK2 has been integrated in the SW component provided by TinyOS_1.x to manage basic communications (i.e. GenericComm) while keeping its original interface to be completely transparent to the upper layers. In fact, GenericComm is the TinyOS_1.x component that allows the exchange of messages with the physical layer through the SendMsg and ReceiveMsg interfaces. Then, it has been replaced by the so called SecureComm component: it provides the same interfaces of GenericComm so that it is able to intercept the exchange of original messages while introducing described security mechanisms. So, a SW component that needs to send a radio messages will use the send() command of SecureComm instead of the GenericComm one. The new implementation delegates the elaborations to a send_message() task. This task generates a random number, performs topology authentication and computes the key by knowing the address of destination node. Then, it encrypts the plain text and produce the packet to be sent on air by means of the original GenericComm send() command. Received messages are managed in a similar way: a new event handler is wired to the receive() handler of GenericComm to delegate some processing to a receive_message() task. Such a task performs topology authentication computing also the key used to decipher the message. It is worth noting that the task is able to authenticate the message accepting or discarding it. When a valid message is identified, it is delivered as it was processed by the original GenericComm receive() handler.
The proposed demo is based on a classic TinyOS_1.x WSN monitoring application (e.g. Oscilloscope [2] or similar) that will be run by means of some Memsic MicaZ nodes with basic light and temperature sensors. Two different application configurations will be running at the same time, with and without the proposed security mechanism, while proper sniffers will monitor the data flow in the different situations to show the different applications behavior. In particular, the demo aims to show the effectiveness of the proposed scheme and its computational efficiency. For the former, the demo will show how the schema is able to satisfy security requirements of Confidentiality, Integrity and Authentication. For the latter, the demo will show off-line and run-time metrics evaluating the overhead of the proposed approach.

References

[1]
Pugliese M., Santucci F. Pair-wise Network Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks using Vector Algebra. 4th IEEE International Workshop on Wireless Sensor Networks Security, 2008
[2]
www.tinyos.net (2013)

Cited By

View all
  • (2021)Formal security proof for a scheme on a topological networkAdvances in Mathematics of Communications10.3934/amc.2021009(0)Online publication date: 2021
  • (2021)An authenticated key scheme over elliptic curves for topological networksJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2020.186629825:8(2429-2448)Online publication date: 6-May-2021
  • (2016)Biometrie data emulation and encryption for sport wearable devices (A case study)2016 Annual IEEE Systems Conference (SysCon)10.1109/SYSCON.2016.7490577(1-6)Online publication date: Apr-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICCPS '13: Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
April 2013
278 pages
ISBN:9781450319966
DOI:10.1145/2502524

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2013

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

ICCPS '13
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Formal security proof for a scheme on a topological networkAdvances in Mathematics of Communications10.3934/amc.2021009(0)Online publication date: 2021
  • (2021)An authenticated key scheme over elliptic curves for topological networksJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2020.186629825:8(2429-2448)Online publication date: 6-May-2021
  • (2016)Biometrie data emulation and encryption for sport wearable devices (A case study)2016 Annual IEEE Systems Conference (SysCon)10.1109/SYSCON.2016.7490577(1-6)Online publication date: Apr-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media