DocumentCode
3526367
Title
On application of Host Identity Protocol in wireless sensor networks
Author
Khurri, Andrey ; Kuptsov, Dmitriy ; Gurtov, Andrei
Author_Institution
Dept. of Comput. Sci. & Eng., Aalto Univ., Helsinki, Finland
fYear
2010
fDate
8-12 Nov. 2010
Firstpage
358
Lastpage
345
Abstract
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating data integrity and confidentiality. Public-key cryptography (PKC) as a countermeasure to potential attacks, although originally treated infeasible for resource-constrained sensor nodes, has shown its eligibility for WSNs in the past few years. However, different security and performance requirements, energy consumption issues, as well as varying hardware capabilities of sensor motes pose a challenge of finding the most efficient security protocol for a particular WSN application and scenario. In this paper, we propose to use the Host Identity Protocol (HIP) as the main component for building network-layer security in WSNs. Combining PKC signatures to authenticate wireless nodes, a Diffie-Hellman key exchange to create a pairwise secret key, a puzzle mechanism to protect against DoS attacks and the IPsec protocol for optional encryption of sensitive application data, HIP provides a standardized solution to many security problems of WSNs. We discuss how HIP can strengthen security of WSNs, suggest possible alternatives to its heavy components in particular WSN applications and evaluate their computational and energy costs on a Linux-based Imote2 wireless sensor platform.
Keywords
cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; Diffie-Hellman key; DoS attacks; HIP; IPsec protocol; PKC signatures; denial-of-service; energy consumption; host identity protocol; low cost wireless sensor platform; network layer security; public key cryptography; resource-constrained sensor nodes; security threats; wireless sensor network; Hip; Polynomials; Protocols; Public key; Wireless sensor networks; Imote2; Public key cryptography; energy consumption; lightweight security; wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on
Conference_Location
San Francisco, CA
ISSN
2155-6806
Print_ISBN
978-1-4244-7488-2
Type
conf
DOI
10.1109/MASS.2010.5663902
Filename
5663902
Link To Document