Pregled bibliografske jedinice broj: 422840
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks // Lecture Notes of ICST (LNICST): 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)
Atena, Grčka: Springer, 2009. (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 422840 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks
Autori
Perković, Toni ; Stančić, Ivo ; Mališa, Luka ; Čagalj, Mario
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Lecture Notes of ICST (LNICST): 5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)
/ - : Springer, 2009
Skup
5th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2009)
Mjesto i datum
Atena, Grčka, 14.09.2009. - 18.09.2009
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
wireless sensor networks; security; key deployment; usability
Sažetak
We consider the classical problem of establishing initial security associations in wireless sensor networks. More speci cally, we focus on pre-deployment phase in which sensor nodes have not yet been loaded with shared secrets or other forms of authentic information. In this paper, we propose two novel multichannel protocols for initialization of large scale wireless sensor networks. The first protocol uses only secret key cryptography and is suitable for CPU-constrained sensor nodes. The second protocol is based on public key cryptography. Both protocols involve communication over a bidirectional radio channel and an unidirectional out-of-band visible light channel. A notable feature of the proposed "public key"-based key deployment protocol is that it is designed to be secure in a very strong attacker model, where an attacker can eavesdrop, jam and modify transmitted messages by adding his own message to both a radio and a visible light channel ; the attacker however cannot disable the visible light communication channel. We show that many existing protocols that rely on the visible light channel are insecure in this strong adversary model. We implemented the proposed protocols on the Meshnetics wireless sensor platform. The proposed protocols are cheap to implement, secure in the very strong attacker model, easy to use and scalable. We also designed and tested a simple random number generator suitable for sensor platforms.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo
POVEZANOST RADA
Projekti:
023-0231924-1660 - NAPREDNE HETEROGENE MREŽNE TEHNOLOGIJE (Begušić, Dinko, MZOS ) ( CroRIS)
Ustanove:
Fakultet elektrotehnike, strojarstva i brodogradnje, Split