Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks (CROSBI ID 553888)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Perković, Toni ; Stančić, Ivo ; Mališa, Luka ; Čagalj, Mario Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks // Lecture Notes of ICST (LNICST): 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009). Springer, 2009

Podaci o odgovornosti

Perković, Toni ; Stančić, Ivo ; Mališa, Luka ; Čagalj, Mario

engleski

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks

We consider the classical problem of establishing initial security associations in wireless sensor networks. More speci cally, we focus on pre-deployment phase in which sensor nodes have not yet been loaded with shared secrets or other forms of authentic information. In this paper, we propose two novel multichannel protocols for initialization of large scale wireless sensor networks. The first protocol uses only secret key cryptography and is suitable for CPU-constrained sensor nodes. The second protocol is based on public key cryptography. Both protocols involve communication over a bidirectional radio channel and an unidirectional out-of-band visible light channel. A notable feature of the proposed "public key"-based key deployment protocol is that it is designed to be secure in a very strong attacker model, where an attacker can eavesdrop, jam and modify transmitted messages by adding his own message to both a radio and a visible light channel ; the attacker however cannot disable the visible light communication channel. We show that many existing protocols that rely on the visible light channel are insecure in this strong adversary model. We implemented the proposed protocols on the Meshnetics wireless sensor platform. The proposed protocols are cheap to implement, secure in the very strong attacker model, easy to use and scalable. We also designed and tested a simple random number generator suitable for sensor platforms.

wireless sensor networks; security; key deployment; usability

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

2009.

objavljeno

Podaci o matičnoj publikaciji

Podaci o skupu

5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)

predavanje

14.09.2009-18.09.2009

Atena, Grčka

Povezanost rada

Računarstvo

Poveznice