Skip to main content

Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors

  • Conference paper
Security Technology (SecTech 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 58))

Included in the following conference series:

Abstract

We proposed modification of Collection Tree Protocol suitable for wireless sensors with tamper resistant module. This platform provides better security, however ordinary protocols cannot utilize its features. Our goal was to offer secure routing protocol with similar behavior and efficiency to the original protocol. Both protocols were simulated to prove that adding security to protocols does not necessarily lead to higher demands to data transfer and thus power consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. TinyOS - an open-source OS for the networked sensor regime, http://www.tinyos.net/

  2. Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: Collection Tree Protocol (CTP), http://www.tinyos.net/tinyos-2.x/doc/txt/tep123.txt

  3. Buonadonna, P., Hill, J., Culler, D.: Active Message Communication for Tiny Networked Sensors. In: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (2001)

    Google Scholar 

  4. Anderson, J.P.: Computer security technology planning study, ESD-TR-73-51, vol. I. ESD/AFSC, Hanscom AFB, Bedford, Mass (NTIS AD-758 206) (October 1972)

    Google Scholar 

  5. Department of Defense, Trusted computer system evaluation criteria, DoD 5200.28-STDm December 1985. US Department of Defense, December 26 (1985)

    Google Scholar 

  6. International Standardization Organization (ISO), Integrated circuit(s) cards with contacts - part 1: physical characteristics, ISO/IEC 7816-1 (1998)

    Google Scholar 

  7. International Standardization Organization (ISO).: Integrated circuit(s) cards with contacts - part 3: electronic signal and transmission protocols. ISO/IEC 7816-3 (1997)

    Google Scholar 

  8. FIPS 81, Operational modes of DES, Federal Information Processing Standard (FIPS), Publication 81, National Bureau of Standards, U.S. Department of Commerce, Washington D.C

    Google Scholar 

  9. Amin, F., Jahangir, A.H., Rasifard, H.: Analysis of public-key cryptography for wireless sensor networks security. In: Proceedings of World Academy of Science, Engineering and Technology (2008) ISSN 1307-6884

    Google Scholar 

  10. Rankl, W., Eng, W.: Smart Card Handbook, 3rd edn. John Wiley & Sons, Ltd., Chichester (2003)

    Google Scholar 

  11. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)

    Google Scholar 

  12. Kramer, M., Geraldy, A.: Energy Measurements for MicaZ Node. In: 5. GI/ITG KuVS Fachgesprch Dahtlose Sensornetze, pp. 61–68 (2006)

    Google Scholar 

  13. Platon, E., Sei, Y.: Security software engineering in wireless sensor networks. In: Progress in Informatics, National Institute of Informatics (2008)

    Google Scholar 

  14. ATMEL: ATMega128 Datasheet: 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash (2008), http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf

  15. Pecho, P., Zboril Jr., F., Drahansky, M., Hanacek, P.: Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science (in press)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pecho, P., Nagy, J., Hanáček, P., Drahanský, M. (2009). Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10847-1_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10846-4

  • Online ISBN: 978-3-642-10847-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics