Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity

نویسندگان

  • Santosh Kumar Panchapakesan
  • Johnny S. Wong
  • Daji Qiao
چکیده

Wireless sensor networks are data centric because in many applications, sensor nodes are required to generate data, collect data, storage data and process data queries. Meanwhile, wireless sensor networks are vulnerable to security attacks because they are deployed in unattended (often hostile) environments and do not have tamper resistant hardware. Therefore, secure and efficient data management schemes are necessary to sensor networks. In this thesis work, we study how to secure a representative type of sensor data management approach called data centric storage based (DCS) schemes, with focus on protecting data confidentiality and integrity. Considerable efforts have been made for securing DCS, however, existing work has the limitations of (i) not considering user node compromise, (ii) lack of studies on real system implementation and detailed experiments, and (iii) lack of studies on integrating security schemes to defend against multiple attacks simultaneously. To overcome these limitations, we have conducted the following research: Firstly, we have designed a new data confidentiality protocol called DKVP (data and key vulnerability protection) scheme to protect sensor data confidentiality in presence of user node compromise. Secondly, we have implemented three polynomial-based sensor data confidentiality and integrity protection schemes, namely, the adaptive polynomial-based scheme for secure data storage and query (APB), the message authentication function based schemes for data integrity (MAF), and the DKVP scheme, on top of TinyOS/Mote platform. Thirdly, we have developed a prototype system that consists of (i) integrated data confidentiality and integrity protection modules (i.e., the APB, MAF and DKVP schemes), (ii) effective and friendly interfaces to application developers to facilitate inclusion of security features into application programs, and (iii) example programs to

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UMTS security: system architecture and hardware implementation

Universal mobile telecommunication system (UMTS) has specified security mechanisms with extra features compared to the security mechanisms of previous mobile communication systems (GSM, DECT). A hardware implementation of the UMTS security mechanism is presented in this paper. The proposed VLSI system supports the Authentication and Key Agreement procedure (AKA), the data confidentiality proced...

متن کامل

Design and Implementation of a SoC-based Security Coprocessor and Program Protection Mechanism for WSN

The practical applications of wireless sensor networks in vulnerable areas require the communication data of sensor devices confidentiality, integrity and freshness. Furthermore the program data of sensor devices need to be protected. In this paper, we present the design, implementation and simulation of an effective hardware security coprocessor namely RC5-FKM and program protection mechanism ...

متن کامل

Design of IPsec and IKE version 1 and 2 ∗

IPsec is a collection of protocols that provides network layer data integrity and confidentiality services. IKEv1 is a versatile key agreement protocol that allows perfect forward secrecy and identity protection (among other things). IKEv2 has similar functionalities as IKEv1, but provides a simpler and better approach to key exchange. Additionally, IKEv2 provides new methods for authentication...

متن کامل

Security Framework for Wireless Sensor Networks

This paper presents an overview of the various issues and requirements of Wireless Sensor Network („WSN‟) deployments, and explores the unique network architecture of WSNs and the security issues involved. It is determined that in order to provide adequate security there is a need for the integration of security services into the existing routing protocols. To this end, an extension of the „Low...

متن کامل

A co-commitment based secure data collection scheme for tiered wireless sensor networks

Tiered wireless sensor networks (WSNs) have many advantages over traditional WSNs. However, they are vulnerable to security attacks, especially the attacks to the storage nodes that buffer and process the data readings from sensors. In this paper, we propose a secure data collection protocol SDC to support timebased queries in tiered WSNs. With small overhead introduced to data communication, S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015