A Distributed Approach to Security in Sensornets
نویسندگان
چکیده
Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks. In this paper we present a scalable and distributed security protocol, DSPS, for WSN that fits in between the network and the transport layers. DSPS satisfies the essential requirements of secure communication such as Data Confidentiality, Data Authentication, Data Integrity and Data Freshness. Basic building blocks of our security protocol are Key Generation-Distribution and Signatures. The key is a 56-bit random number generated initially by a key server, which is then securely distributed to all the nodes in the cluster. This key is used for encryption. DSPS also supports security critical transactions by dynamically generating a key, which can be shared between two nodes. The simplicity of DSPS allows compatibility with most of the routing protocols. Keywords-component; wireless sensor networks (WSN); security protocols;
منابع مشابه
Multicast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach
Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...
متن کاملDistributed Clone Detection in Mobile Sensor Networks
In this paper we present a clone detection technique for mobile wireless sensor networks. Since sensor nodes can be compromised and cloned by an adversary, it is desirable to have a distributed clone detection algorithm wherein the nodes in the network themselves identify cloned nodes. Most approaches in the literature have a deterministic set of witness nodes that check for the presence of clo...
متن کاملSeparating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملOptimal and Global Time Synchronization in Sensornets
Time synchronization is necessary in many distributed systems, but achieving synchronization in sensornets, which combine stringent precision requirements with severe resource constraints, is particularly challenging. This challenge has been met by the recent Reference-Broadcast Synchronization (RBS) proposal, which provides ondemand pairwise synchronization with low overhead and high precision...
متن کاملTuning Protocols to Improve the Energy Efficiency of Sensornets
Energy efficiency is of critical importance in sensornets where the working life of wireless motes, and consequently the entire network, is limited by the finite energy capacity of batteries. Radio network activity typically dominates the energy consumption profile of motes running distributed applications, and hence represents the obvious target when attempting to use energy more frugally. Sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003