On Secure Communication over Wireless Sensor Networks

Stefan Rass, Michał Koza

Abstract

This paper investigates (perfectly) secure message transmission over a wireless sensor network. Using a layered network architecture and a very simple form of routing, we show how to construct an arbitrarily secure communication channel over a given infrastructure of wireless devices. Our construction is computationally cheap and requires no cryptographic primitive beyond symmetric encryption on the channels. The security of the transmission can be made arbitrarily strong (in an information-theoretic sense).

References

  1. Anderson, R., Chan, H., and Perrig, A. (2004). Key infection: Smart trust for smart dust. In Proc. of IEEE Int. Conf. on Network Protocols (ICNP).
  2. Chan, H. and Perrig, A. (2005). PIKE: peer intermediaries for key establishment in sensor networks. In INFOCOM 2005. Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies., volume 1, pages 524-535.
  3. Chan, H., Perrig, A., and Song, D. (2003). Random key predistribution schemes for sensor networks. In Proc. of the IEEE Symp. on Security and Privacy, pages 197- 213. IEEE Computer Society.
  4. CichoÁ, J., Grzaslewicz, J., and Kutylowski, M. (2009). Key levels and securing key predistribution against node captures. In ALGOSENSORS, pages 64-75.
  5. Di Pietro, R., Mancini, L. V., and Mei, A. (2006). Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wirel. Netw., 12:709-721.
  6. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
  7. Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In CCS 7802: Proc. of the 9th ACM Conf. on Computer and communications security, pages 41-47. ACM Press.
  8. Franklin, M. and Wright, R. (2000). Secure communication in minimal connectivity models. J. of Cryptology, 13(1):9-30.
  9. Jaworski, J., Ren, M., and Rybarczyk, K. (2009). Random key predistribution for wireless sensor networks using deployment knowledge. Computing, 85(1-2):57-76.
  10. Klonowski, M., Koza, M., and Kutylowski, M. (2011). How to transmit messages via WSN in a hostile environment. In Proc. of the Int. Conf. on Security and Cryptography (SECRYPT), pages 134-143. SciTePress.
  11. Klonowski, M. and Kutylowski, M. (2005). Provable anonymity for networks of mixes. In Information Hiding, pages 26-38.
  12. Klonowski, M., Kutylowski, M., Ren, M., and Rybarczyk, K. (2007). Forward-secure key evolution in wireless sensor networks. In CANS, pages 102-120. Springer.
  13. Perrig, A., Stankovic, J. A., and Wagner, D. (2004). Security in wireless sensor networks. Commun. ACM, 47(6):53-57.
  14. Rass, S. and Schartner, P. (2010). A unified framework for the analysis of availability, reliability and security, with applications to quantum networks. IEEE Trans. on Systems, Man, and Cybernetics - Part C: Applications and Reviews, 40(5):107-119.
  15. Ren, M., Das, T. K., and Zhou, J. (2006). Diverging keys in wireless sensor networks. In ISC, pages 257-269.
  16. Yu, J. Y. and Chong, P. H. J. (2005). A survey of clustering schemes for mobile ad hoc networks. Communications, 7(1):32-48.
Download


Paper Citation


in Harvard Style

Rass S. and Koza M. (2012). On Secure Communication over Wireless Sensor Networks . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 364-367. DOI: 10.5220/0004018403640367


in Bibtex Style

@conference{secrypt12,
author={Stefan Rass and Michał Koza},
title={On Secure Communication over Wireless Sensor Networks},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={364-367},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004018403640367},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - On Secure Communication over Wireless Sensor Networks
SN - 978-989-8565-24-2
AU - Rass S.
AU - Koza M.
PY - 2012
SP - 364
EP - 367
DO - 10.5220/0004018403640367