Abstract
Confidentiality and integrity of wireless data transmissions are vital for sensor networks used in critical infrastructure assets. While the challenges could be addressed using standard encryption techniques, the sensors are often power-limited, bandwidth-constrained or too rudimentary to accommodate the power and latency overhead of robust encryption and decryption implementations. To address this gap, this chapter proposes a novel methodology in which data is split between two distinct wireless channels to achieve acceptable levels of data confidentiality and/or integrity. Threat scenarios are discussed in which an attacker gains access to one of the two communications channels to either eavesdrop on or modify data in transit. Given these threats, five data splitting methods are presented that employ the two-channel communications concept to detect and adapt to the attacks, and provide varying levels of data security. Additionally, a simple proof-of-concept packet structure is introduced that facilitates data transmission over the two channels in accordance with the data-splitting methods.
Chapter PDF
Similar content being viewed by others
References
R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith and L. Wingers, The SIMON and SPECK lightweight block ciphers, Proceedings of the Fifty-Second ACM/EDAC/IEEE Design Automation Conference, 2015.
H. Kalita and A. Kar, Wireless sensor network security analysis, International Journal of Next-Generation Networks, vol. 1(1), pp. 1–10, 2009.
P. Koopman and T. Chakravarty, Cyclic redundancy code (CRC) polynomial selection for embedded networks, Proceedings of the International Conference on Dependable Systems and Networks, pp. 145–154, 2004.
T. Nie, L. Zhou and Z. Lu, Power evaluation methods for data encryption algorithms, IET Software, vol. 8(1), pp. 12–18, 2014.
G. Padmavathi and D. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks, International Journal of Computer Science and Information Security, vol. 4(1-2), paper no. 20070913, 2009.
Y. Shiu, S. Chang, H. Wu, S. Huang and H. Chen, Physical layer security in wireless networks: A tutorial, IEEE Wireless Communications, vol. 18(2), pp. 66–74, 2011.
F. Zhang, R. Dojen and T. Coffey, Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node, International Journal of Sensor Networks, vol. 10(4), pp. 192–201, 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 This is a U.S. government work and not under copyright protection in the United States; foreign copyright protection may apply
About this paper
Cite this paper
Wolfe, C., Graham, S., Mills, R., Nykl, S., Simon, P. (2018). Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XII. ICCIP 2018. IFIP Advances in Information and Communication Technology, vol 542. Springer, Cham. https://doi.org/10.1007/978-3-030-04537-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-04537-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04536-4
Online ISBN: 978-3-030-04537-1
eBook Packages: Computer ScienceComputer Science (R0)