A secure communication protocol for ad-hoc wireless sensor networks
read more
Citations
A prototype for achieving digital forensic readiness on wireless sensor networks
Towards TCP/IP for wireless sensor networks
Protecting Consumer Data in Composite Web Services
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network.
Security in Wireless Sensor Networks: Attacks and Evasion
References
Tor: the second-generation onion router
A key-management scheme for distributed sensor networks
Random key predistribution schemes for sensor networks
Secure routing in wireless sensor networks: attacks and countermeasures
Security for Sensor Networks
Related Papers (5)
Frequently Asked Questions (22)
Q2. What have the authors stated for future works in "A secure communication protocol for ad-hoc wireless sensor networks" ?
Additionally, OTKs have the security feature of using keys only once for each resource request and greatly reduced the possibility of cryptographic attacks by informed enemies. The authors anticipate results from their work to encourage further research into using the SPKI/SDSI access control framework within ad-hoc wireless sensor networks.
Q3. Why is latency a concern for wireless sensors?
Due to the amount of public key cryptographic operations involved for each resource request, latency is a concern for wireless sensors.
Q4. What are the advantages of using a symmetric key agreement protocol?
Reducing the number of exchanged messages, non-deterministic choices and public key operations helped make the protocol both simpler in design and computationally faster than SSL, as their results will show.
Q5. What are the expensive operations required for the TCP/IP protocol?
The most expensive operations required involve public key cryptographic operations of key generation (a once-off cost), public key encryption and decryption.
Q6. What are the main issues that are still open?
Routing [3], key establishment [4], [5], network-level confidentiality and data authentication [6] and certificate chain discovery [7] have shown promising results, however application-layer authentication and authorisation are still open issues.
Q7. What is the way to avoid cryptanalysis?
The authors assume message digest functions (also known as oneway hash functions), symmetric key ciphers and public key ciphers are secure enough to avoid cryptanalysis in a reasonable amount of time.
Q8. What are some ways to prevent replay attacks?
Other ways to prevent replay attacks include using timestamps (requires synchronised clocks and a network time server) and exchange of randomly generated nonces.
Q9. What is the need for storage capacity for the Java Virtual Machine?
Devices will need enough storage capacity to contain the Java Virtual Machine, which is the implementation platform used for the SPKI/SDSI framework, including SPKI-SECURE cryptographic functions.
Q10. What is the way to secure a wireless sensor network?
Simple Public Key Infrastructure / Simple Distributed Systems Infrastructure (SPKI/SDSI) certificates can provide fine-grained access control for authorisation of access requests to services, and its simplicity makes it a platform of choice in sensor networks.
Q11. What is the way to tunnel SPKI/SDSI?
Prior work suggested tunnelling SPKI/SDSI over a transport layer security protocol, such as Secure Sockets Layer (SSL), for authentication, confidentiality and protection against replay and middle-person attacks [1].
Q12. What is the way to secure a sensor network?
the authors expect the adoption of SPKI-SECURE-FAST on wireless sensor networks to bring much needed trust of sensor data collection with optimised performance.
Q13. What are the main reasons for the replay attacks?
Such attacks involve breaking host security, an act that their research assumes safe, or discovering an unknown weakness within the Diffie-Hellman key agreement protocol; • Replay attacks involve an eavesdropper catching a message in transit and replaying it at a later time to attempt to gain unauthorised access.
Q14. What protocol is used to establish a shared secret without having to communicate secrets?
The authors use the DiffieHellman key agreement protocol as this allows for a shared secret to be established without having to communicate secrets over an insecure channel; 4) SP and server use the symmetric key as a master key and generate a list of one-time keys (OTK List) by repeatedly hashing the master key (described shortly).
Q15. What is the way to replace proxies in a resource-constrained WSN?
In resource constrained WSNs, these can be replaced by simpler components, such as TinyOS (including Java 2 Micro Edition), and the Extended Tiny Encryption Algorithm (XTEA) for encryption and hashing.
Q16. What did the researchers do to make the sensor network more secure?
The authors assumed proxies to be embedded into their wireless sensors, which eliminated the need of porting the implementation to ARM processors and having an existing wireless sensor network.
Q17. What is the expensive operation to remove public key cryptography?
Completely removing public key cryptography is not favoured as it provides certificatebased access control, painless symmetric key distribution and strong user authentication.
Q18. What is the importance of a host security?
While not researched here, host security is important for sensor networks as they are often in unmanned, but publicly accessible environments.
Q19. What is the way to generate the hash output?
Using a secure hash function provides the ’one-way’ property whereby it is computationally easy to generate the hash output, but infeasible to determine the hash input given the hash output [8].
Q20. What would be the requirements for the encryption of a list?
List would need to be encrypted if it was communicated (by using the shared key generated by the symmetric-key exchange protocol).
Q21. What is the protocol required to use?
The proposed protocol is within the limitations of WSNs, as shown below:• Memory requirements: Both SP and server proxy will require a state table that records session information, an OTK List and an identifier noting which OTK will be used for the currently negotiated or next resource request.
Q22. What is the main difference between OTKs and other security extensions?
OTKs have the security feature of using keys only once for each resource request and greatly reduced the possibility of cryptographic attacks by informed enemies.