• DocumentCode
    3526367
  • Title

    On application of Host Identity Protocol in wireless sensor networks

  • Author

    Khurri, Andrey ; Kuptsov, Dmitriy ; Gurtov, Andrei

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Aalto Univ., Helsinki, Finland
  • fYear
    2010
  • fDate
    8-12 Nov. 2010
  • Firstpage
    358
  • Lastpage
    345
  • Abstract
    Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns of WSNs receiving closer attention of research community. Well known security threats in WSNs range from Denial-of-Service (DoS), Replay and Sybil attacks to those targeted at violating data integrity and confidentiality. Public-key cryptography (PKC) as a countermeasure to potential attacks, although originally treated infeasible for resource-constrained sensor nodes, has shown its eligibility for WSNs in the past few years. However, different security and performance requirements, energy consumption issues, as well as varying hardware capabilities of sensor motes pose a challenge of finding the most efficient security protocol for a particular WSN application and scenario. In this paper, we propose to use the Host Identity Protocol (HIP) as the main component for building network-layer security in WSNs. Combining PKC signatures to authenticate wireless nodes, a Diffie-Hellman key exchange to create a pairwise secret key, a puzzle mechanism to protect against DoS attacks and the IPsec protocol for optional encryption of sensitive application data, HIP provides a standardized solution to many security problems of WSNs. We discuss how HIP can strengthen security of WSNs, suggest possible alternatives to its heavy components in particular WSN applications and evaluate their computational and energy costs on a Linux-based Imote2 wireless sensor platform.
  • Keywords
    cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; Diffie-Hellman key; DoS attacks; HIP; IPsec protocol; PKC signatures; denial-of-service; energy consumption; host identity protocol; low cost wireless sensor platform; network layer security; public key cryptography; resource-constrained sensor nodes; security threats; wireless sensor network; Hip; Polynomials; Protocols; Public key; Wireless sensor networks; Imote2; Public key cryptography; energy consumption; lightweight security; wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on
  • Conference_Location
    San Francisco, CA
  • ISSN
    2155-6806
  • Print_ISBN
    978-1-4244-7488-2
  • Type

    conf

  • DOI
    10.1109/MASS.2010.5663902
  • Filename
    5663902