DocumentCode :
3526367
Title :
On application of Host Identity Protocol in wireless sensor networks
Author :
Khurri, Andrey ; Kuptsov, Dmitriy ; Gurtov, Andrei
Author_Institution :
Dept. of Comput. Sci. & Eng., Aalto Univ., Helsinki, Finland
fYear :
2010
fDate :
8-12 Nov. 2010
Firstpage :
358
Lastpage :
345
Abstract :
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating data integrity and confidentiality. Public-key cryptography (PKC) as a countermeasure to potential attacks, although originally treated infeasible for resource-constrained sensor nodes, has shown its eligibility for WSNs in the past few years. However, different security and performance requirements, energy consumption issues, as well as varying hardware capabilities of sensor motes pose a challenge of finding the most efficient security protocol for a particular WSN application and scenario. In this paper, we propose to use the Host Identity Protocol (HIP) as the main component for building network-layer security in WSNs. Combining PKC signatures to authenticate wireless nodes, a Diffie-Hellman key exchange to create a pairwise secret key, a puzzle mechanism to protect against DoS attacks and the IPsec protocol for optional encryption of sensitive application data, HIP provides a standardized solution to many security problems of WSNs. We discuss how HIP can strengthen security of WSNs, suggest possible alternatives to its heavy components in particular WSN applications and evaluate their computational and energy costs on a Linux-based Imote2 wireless sensor platform.
Keywords :
cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; Diffie-Hellman key; DoS attacks; HIP; IPsec protocol; PKC signatures; denial-of-service; energy consumption; host identity protocol; low cost wireless sensor platform; network layer security; public key cryptography; resource-constrained sensor nodes; security threats; wireless sensor network; Hip; Polynomials; Protocols; Public key; Wireless sensor networks; Imote2; Public key cryptography; energy consumption; lightweight security; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on
Conference_Location :
San Francisco, CA
ISSN :
2155-6806
Print_ISBN :
978-1-4244-7488-2
Type :
conf
DOI :
10.1109/MASS.2010.5663902
Filename :
5663902
Link To Document :
بازگشت