Skip to main content

Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks

  • Conference paper
Sensor Systems and Software (S-CUBE 2013)

Abstract

A Wireless Sensor Network (WSN) is a versatile and distributed sensing system that is able to support a wide variety of application domains. One of the most important issue in WSN design is to guarantee the reliability of the collected data which involves in turn security issues across wireless links. This paper deals with the cryptographic aspects in the broader field of security in WSNs. In particular, moving from some previous advances in our research activity, this manuscript proposes a novel cryptographic scheme that is compliant to security requirements that may arise from real-world WSN applications and reports some details about an implementation in TinyOS that we have carried for experimental validation. The proposed scheme, called TAKS2, exploits benefits from Hybrid Cryptography to handle resource constraints and allows to generate topology authenticated keys to provide increased robustness to the scheme itself.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abbasi, A.A., Younis, M.: A Survey on Clustering Algorithms for Wireless Sensor Networks. Computer Communications 30 (2007)

    Google Scholar 

  2. Agilla Home Page, http://mobilab.wustl.edu/projects/agilla/

  3. Blom, R.: An optimal class of symmetric key generation systems. Eurocrypt 84 (1985)

    Google Scholar 

  4. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Techical Report TR-05-07, Troy (2005)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy (2003)

    Google Scholar 

  6. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004) ISBN 0-387-95273-X

    Google Scholar 

  7. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. In: Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, USA, pp. 93–104 (November 2000)

    Google Scholar 

  8. Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems, LARTES (2002)

    Google Scholar 

  9. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003)

    Google Scholar 

  10. Menezes, A.J., Van Oorschot, P., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  11. Vlajic, N., Xia, D.: Wireless Sensor Networks: To Cluster or Not To Cluster? In: Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Buffalo (2006)

    Google Scholar 

  12. Pugliese, M., Giani, A., Santucci, F.: A Weak Process Approach to Anomaly Detection in Wireless Sensor Networks. In: First International Workshop on Sensor Networks, SN 2008 (2008)

    Google Scholar 

  13. Pugliese, M., Pomante, L., Santucci, F.: Agent-based Scalable Design of a Cross-Layer Security Framework for Wireless Sensor Networks Monitoring Applications. In: Proceedings of the International Workshop on Scalable Ad Hoc and Sensor Networks (SASN 2009), Saint Petersburg (2009)

    Google Scholar 

  14. Pugliese, M., Pomante, L., Santucci, F.: Secure Platform over Wireless Sensor Networks. INTECH Publishers (2012) ISBN 978-953-51-0218-2

    Google Scholar 

  15. Pugliese, M., Santucci, F.: Pair-wise Network Topology Authenticated Hybrid Cryptographic Keys for Wireless Sensor Networks using Vector Algebra. In: 4th IEEE International Workshop on Wireless Sensor Networks Security (WSNS 2008), Atlanta (2008)

    Google Scholar 

  16. Pugliese, M., Pomante, L., Santucci, F.: Topology Optimization and Network Deployment Algorithm in WSNs for Mobile Agent-based Applications. In: 4th European Modelling Symposium, EMS 2010 (2010)

    Google Scholar 

  17. Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. TinyOS Home Page, http://www.tinyos.net

  19. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM 2005), Washington, pp. 324–328 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Marchesani, S., Pomante, L., Pugliese, M., Santucci, F. (2013). Definition and Development of a Topology-Based Cryptographic Scheme for Wireless Sensor Networks. In: Zuniga, M., Dini, G. (eds) Sensor Systems and Software. S-CUBE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 122. Springer, Cham. https://doi.org/10.1007/978-3-319-04166-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04166-7_4

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04165-0

  • Online ISBN: 978-3-319-04166-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics