Abstract
Adapting security protocols to wireless sensor networks architectures is a challenging research field because of their specific constraints. Actually, sensors are computationally weak devices, unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie-Hellman). In this paper, we introduce Tiny 3-TLS, an extension and adaptation of TLS handshake sub-protocol that allows establishing secure communications between sensing nodes and remote monitoring terminals. Our protocol aims at guaranteeing the integrity and confidentiality of communications between sensors and distant terminals, after having established mutual authentication between the two parties. In order to achieve these security goals without putting too much burden on sensing devices, Tiny 3-TLS rely on an intermediate node, the sink node. Depending on the trustworthiness of this sink node and on the applications, we propose two versions of our proposition. Besides, we provide a formal validation of the protocol’s security goals achievement and an evaluation of its computation and delay performances.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
The Avrora project homepage, http://compilers.cs.ucla.edu/avrora/
The AVISPA project homepage, http://www.avispa-project.org/
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (October 2004)
Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet. In: Third IEEE International Conference on Pervasive Computing and Communications (March 2005)
Masmoudi, K., Hussein, M., Afifi, H., Seret, D.: Tri-party TLS Adaptation for Trust Delegation in Home Networks. In: IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (September 2005)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol - Version 1.1. IETF RFC 4346 (April 2006)
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Miller, V.: Uses of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Chevalier, Y., et al.: A High-Level Protocol Specification Language for Industrial Security-Sensitive Protocols, www.avispa-project.org
Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)
Basin, D., Modersheim, S., Viganno, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)
Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)
Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003 (May 2003), ISBN 0-7381-3677-5
IST MAGNET-Beyond project homepage, http://www.ist-magnet.org
IEEE Std. 802.1X-2004, Standards for Local and Metropolitan Area Networks: Port Based Network Acces Control
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fouladgar, S., Mainaud, B., Masmoudi, K., Afifi, H. (2006). Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_5
Download citation
DOI: https://doi.org/10.1007/11964254_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69172-3
Online ISBN: 978-3-540-69173-0
eBook Packages: Computer ScienceComputer Science (R0)