Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/381677.381696acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

SPINS: security protocols for sensor networks

Published: 16 July 2001 Publication History

Abstract

As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and useful, and has not concentrated on security.
We present a suite of security building blocks optimized for resource-constrained environments and wireless communication. SPINS has two secure building blocks: SNEP and μTESLA SNEP provides the following important baseline security primitives: Data confidentiality, two-party data authentication, and data freshness. A particularly hard problem is to provide efficient broadcast authentication, which is an important mechanism for sensor networks. μTESLA is a new protocol which provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

References

[1]
Secure Microcontrollers for SmartCards. http: //www.atmel.com/atmel/acrobat/1065s.pdf.]]
[2]
Steven Bellovin and Michael Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise. In First ACM Conference on Computer and Communications Security CCS-1, pages 244-250, 1993.]]
[3]
David W. Carman, Peter S. Kruus, and Brian J. Matt. Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.]]
[4]
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 24 - 35, Seattle, WA USA, August 1999.]]
[5]
D. Johnson and D.A. Maltz and J. Broch. The dynamic source routing protocol for mobile ad hoc networks (internet-draft). In Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.]]
[6]
Joan Daemen and Vincent Rijmen. AES proposal: Rijndael, March 1999.]]
[7]
iButton: A Java-Powered Cryptographic iButton. http: //www.ibutton.com/ibuttons/java.html.]]
[8]
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.]]
[9]
Whitfield Diffie and Martin E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397-427, March 1979.]]
[10]
Armando Fox and Steven D. Gribble. Security on the move: indirect authentication using Kerberos. In Second Annual International Conference on Mobile Computing and Networking (MOBICOM 1996), pages 155-164, White Plains, NY USA, November 1996.]]
[11]
R. Gennaro and P. Rohatgi. How to sign digital streams. In Burt Kaliski, editor, Advances in Cryptology - Crypto '97, pages 180-197, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Volume 1294.]]
[12]
Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270-299, 1984.]]
[13]
Z.J. Haas and M. Perlman. The zone routing protocol (ZRP) for ad hoc networks (Internet-Draft). 1998.]]
[14]
Neil M. Haller. The S/KEY one-time password system. In ISOC, 1994.]]
[15]
D. Harkins and D. Carrel. The internet key exchange (IKE). Request for Comments 2409, Information Sciences Institute, University of Southern California, November 1998.]]
[16]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, November 2000.]]
[17]
D.B. Johnson and D.A. Maltz. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, 1996.]]
[18]
Young-Bae Ko and Nitin Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the Fourth International Conference on Mobile Computing and Networking (MobiCom'98), October 1998.]]
[19]
J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5), September 1993. Status: PROPOSED STANDARD.]]
[20]
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, October 1979.]]
[21]
H. Lipmaa, P. Rogaway, and D. Wagner. Counter mode encryption. http://csrc.nist.gov/encryption/modes/.]]
[22]
Alfred J. Menezes, Paul van Oorschot, and Scott Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.]]
[23]
S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. In Project Athena Technical Plan, page section E.2.1, 1987.]]
[24]
N. Modadugu, D. Boneh, and M. Kim. Generating RSA keys on a handheld using an untrusted server. In RSA 2000, 2000.]]
[25]
NIST. Advanced encryption standard (AES) development effort. http://csrc.nist.gov/encryption/aes/, October 2000.]]
[26]
V.D. Park and M.S. Corson. A highly adaptable distributed routing algorithm for mobile wireless networks. In IEEE INFOCOMM'97, 1997.]]
[27]
Bhrat Patel and Jon Crowcroft. Ticket based service access for the mobile user. In Third annual ACM/IEEE international conference on Mobile computing and networking, pages 223-233, Budapest Hungary, September 1997.]]
[28]
C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM Symposium on Communication, Architectures and Applications, 1994.]]
[29]
C.E. Perkins and E.M. Royer. Ad hoc on-demand distance vector routing. In IEEE WMCSA'99, February 1999.]]
[30]
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS '01, February 2001.]]
[31]
Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, May 2000.]]
[32]
K. S. J. Pister, J. M. Kahn, and B. E. Boser. Smart dust: Wireless networks of millimeter-scale sensor nodes, 1999.]]
[33]
R. L. Rivest. The RC5 encryption algorithm. Proc. 1st Workshop on Fast Software Encryption, pages 86-96, 1995.]]
[34]
Ronald L. Rivest. The MD5 message-digest algorithm. Internet Request for Comments, April 1992. RFC 1321.]]
[35]
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.]]
[36]
Pankaj Rohatgi. A compact and fast hybrid signature scheme for multicast packet authentication. In 6th ACM Conference on Computer and Communications Security, November 1999.]]
[37]
S. Marti and T. Giuli and K. Lai and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of Mobicom 2000, August 2000.]]
[38]
Bruce Schneier. Applied Cryptography (Second Edition). John Wiley & Sons, 1996.]]
[39]
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In B. Christianson, B. Crispo, and M. Roe, editors, Security Protocols, 7th International Workshop. Springer Verlag Berlin Heidelberg, 1999.]]
[40]
David Tennenhouse. Embedding the Internet: Proactive computing. Communications of the ACM, 43(5):43-43, 2000.]]
[41]
U. S. National Institute of Standards and Technology (NIST). DES model of operation. Federal Information Processing Standards Publication 81 (FIPS PUB 81).]]
[42]
U. S. National Institute of Standards and Technology (NIST). Data Encryption Standard (DES). Draft Federal Information Processing Standards Publication 46-3 (FIPS PUB 46-3), January 1999.]]
[43]
David Wheeler and Roger Needham. TEA, a tiny encryption algorithm. http://www.ftp.cl.cam.ac.uk/ftp/ papers/djw-rmn/djw-rmn-tea.html, November 1994.]]
[44]
Gideon Yuval. Reinventing the Travois: Encryption/MAC in 30 ROM bytes. In Proc. 4th Workshop on Fast Software Encryption, 1997.]]
[45]
L. Zhou and Z.J. Hass. Securing ad hoc networks. 13(6), November/December 1999.]]

Cited By

View all
  • (2024)Security Enhancement for Deep Reinforcement Learning-Based Strategy in Energy-Efficient Wireless Sensor NetworksSensors10.3390/s2406199324:6(1993)Online publication date: 21-Mar-2024
  • (2024)Defense against Black Hole Attacks in Wireless Sensor Network with Anomaly Report Cycling2024 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC61514.2024.10592393(1570-1576)Online publication date: 27-May-2024
  • (2024)Lightweight Multicast Authentication in NoC-based SoCs2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528746(1-8)Online publication date: 3-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking
July 2001
356 pages
ISBN:1581134223
DOI:10.1145/381677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 July 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

MobiCom01
Sponsor:

Acceptance Rates

MobiCom '01 Paper Acceptance Rate 30 of 281 submissions, 11%;
Overall Acceptance Rate 420 of 2,893 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)62
  • Downloads (Last 6 weeks)8
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Security Enhancement for Deep Reinforcement Learning-Based Strategy in Energy-Efficient Wireless Sensor NetworksSensors10.3390/s2406199324:6(1993)Online publication date: 21-Mar-2024
  • (2024)Defense against Black Hole Attacks in Wireless Sensor Network with Anomaly Report Cycling2024 International Wireless Communications and Mobile Computing (IWCMC)10.1109/IWCMC61514.2024.10592393(1570-1576)Online publication date: 27-May-2024
  • (2024)Lightweight Multicast Authentication in NoC-based SoCs2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528746(1-8)Online publication date: 3-Apr-2024
  • (2024)Intuitionistic Fuzzy-Based Trust Computation for Secure Routing in IoTCryptology and Network Security with Machine Learning10.1007/978-981-97-0641-9_50(731-744)Online publication date: 23-Apr-2024
  • (2024)Security in Sensor NetworksGuide to Computer Network Security10.1007/978-3-031-47549-8_20(475-490)Online publication date: 20-Jan-2024
  • (2023)Clustering-Based Energy-Efficient Self-Healing Strategy for WSNs Under Jamming AttacksSensors10.3390/s2315689423:15(6894)Online publication date: 3-Aug-2023
  • (2023)Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIBInformation10.3390/info1412065314:12(653)Online publication date: 8-Dec-2023
  • (2023)Real-Time Lightweight Cloud-Based Access Control for Wearable IoT Devices: A Zero Trust ProtocolProceedings of the First International Workshop on Security and Privacy of Sensing Systems10.1145/3628356.3630118(22-29)Online publication date: 12-Nov-2023
  • (2023)DT-DS: CAN Intrusion Detection with Decision Tree EnsemblesACM Transactions on Cyber-Physical Systems10.1145/35661327:1(1-27)Online publication date: 22-Mar-2023
  • (2023)A Survey: Authentication Protocols & Security Analysis for Wireless Sensor Networks2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10307952(1-7)Online publication date: 6-Jul-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media