Abstract
Wireless Sensor Networks (WSNs) are infrastructure-less and fully distributed systems of self-configurable and self-organizing nodes that wish to exchange information over the air. Security in WSN is challenging, because of its special characteristics, and due to the scarcity of energy and processing power. Many WSN scenarios demand authentication, confidentiality and integrity services. In this paper, we introduce a framework to address these main security services based on a special protocol that integrates public key and symmetric key algorithms to ensure optimal usage of sensors’ energy and processing power, and provide adequate security. The proposed framework utilizes Elliptic Curve Cryptography (ECC) and AES to achieve a reasonable tradeoff.
This research work is funded by the National Plan for Science and Technology at King Saud University, Project number: 11-INF1500-02.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)
Sen, J.: A survey on wireless sensor network security. Arxiv preprint arXiv:1011.1529 (2010)
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64 (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Diffie, W., Hellman, M.E.: ‘New directions in cryptography. Secure Communications and Asymmetric Cryptosystems, 143–180 (1982)
Kadri, B., Feham, M., M’hamed, A.: Lightweight PKI for WSN uPKI. Presented at I. J. Network Security, 194–200 (2010)
Nasser, N., Chen, Y.: SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications 30(11-12), 2401–2412 (2007)
Amin, F., Jahangir, A., Rasifard, H.: Analysis of public-key cryptography for wireless sensor networks security. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 31 (2008)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Cryptographic Hardware and Embedded Systems, CHES 2004, pp. 925–943 (2004)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, pp. 324–328
Noroozi, E., Kadivar, J., Shafiee, S.H.: Energy analysis for wireless sensor networks. In: 2010 2nd International Conference on Mechanical and Electronics Engineering (ICMEE), vol. 2, pp. V2–382 (2010)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)
RFC of x.509, http://www.ietf.org/rfc/rfc3280.txt
Gormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms. MIT Press, Cambridge (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Faisal, M., Muhtadi, J.A., Al-Dhelaan, A. (2012). Towards Efficient Security Services in Wireless Sensor Networks. In: Kim, Th., Kang, JJ., Grosky, W.I., Arslan, T., Pissinou, N. (eds) Computer Applications for Bio-technology, Multimedia, and Ubiquitous City. BSBT MulGraB IUrC 2012 2012 2012. Communications in Computer and Information Science, vol 353. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35521-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-35521-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35520-2
Online ISBN: 978-3-642-35521-9
eBook Packages: Computer ScienceComputer Science (R0)