Abstract
We proposed modification of Collection Tree Protocol suitable for wireless sensors with tamper resistant module. This platform provides better security, however ordinary protocols cannot utilize its features. Our goal was to offer secure routing protocol with similar behavior and efficiency to the original protocol. Both protocols were simulated to prove that adding security to protocols does not necessarily lead to higher demands to data transfer and thus power consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
TinyOS - an open-source OS for the networked sensor regime, http://www.tinyos.net/
Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: Collection Tree Protocol (CTP), http://www.tinyos.net/tinyos-2.x/doc/txt/tep123.txt
Buonadonna, P., Hill, J., Culler, D.: Active Message Communication for Tiny Networked Sensors. In: Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (2001)
Anderson, J.P.: Computer security technology planning study, ESD-TR-73-51, vol. I. ESD/AFSC, Hanscom AFB, Bedford, Mass (NTIS AD-758 206) (October 1972)
Department of Defense, Trusted computer system evaluation criteria, DoD 5200.28-STDm December 1985. US Department of Defense, December 26 (1985)
International Standardization Organization (ISO), Integrated circuit(s) cards with contacts - part 1: physical characteristics, ISO/IEC 7816-1 (1998)
International Standardization Organization (ISO).: Integrated circuit(s) cards with contacts - part 3: electronic signal and transmission protocols. ISO/IEC 7816-3 (1997)
FIPS 81, Operational modes of DES, Federal Information Processing Standard (FIPS), Publication 81, National Bureau of Standards, U.S. Department of Commerce, Washington D.C
Amin, F., Jahangir, A.H., Rasifard, H.: Analysis of public-key cryptography for wireless sensor networks security. In: Proceedings of World Academy of Science, Engineering and Technology (2008) ISSN 1307-6884
Rankl, W., Eng, W.: Smart Card Handbook, 3rd edn. John Wiley & Sons, Ltd., Chichester (2003)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (2002)
Kramer, M., Geraldy, A.: Energy Measurements for MicaZ Node. In: 5. GI/ITG KuVS Fachgesprch Dahtlose Sensornetze, pp. 61–68 (2006)
Platon, E., Sei, Y.: Security software engineering in wireless sensor networks. In: Progress in Informatics, National Institute of Informatics (2008)
ATMEL: ATMega128 Datasheet: 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash (2008), http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf
Pecho, P., Zboril Jr., F., Drahansky, M., Hanacek, P.: Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science (in press)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pecho, P., Nagy, J., Hanáček, P., Drahanský, M. (2009). Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-10847-1_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10846-4
Online ISBN: 978-3-642-10847-1
eBook Packages: Computer ScienceComputer Science (R0)