ECDSA for generating the hash of the message and
signing it using the private key of the sender.
Availability. In our solution the intruder can only
paralyze the system by physically accessing the in-
dividual sensor nodes. Whereas our frequency hop-
ping mechanism is resilient against a denial of ser-
vice attack. It makes it hard on an attacker to jam
the network, it will need to jam over all the available
channels simultaneously. Even if it does so, when
the MAC layer is not able to find a free channel to
use, it will stop sending messages. By not sending
messages, the network supervisor is able to notice the
malfunction and suspect a jamming over all the avail-
able channels.
Energy-efficiency. The time segmentation ap-
proach allows nodes to save energy and sleep during
the time slots where they are not concerned by the
communication. End-devices are active only during
the time slots specified by the router to which they are
associated. A router is active during the time slots of
its end-devices, the time slots of its router neighbors
and [T
2
;T
3
]. In addition, all nodes save energy during
[T
3
;T
0
].
5 CONCLUSIONS
In this paper we presented a energy-efficient security
management for wireless sensor networks based on
pre-distributing ECC public keys before deployment.
These public keys are then used to create session keys
to encrypt the exchanged critical information such as
frequency hopping information and permutation ci-
phers. In addition, we proposed to use frequency
hopping in a secure way by exchanging secret fre-
quency hopping sequences which enable nodes to re-
sist against deny of service attack and eavesdropping.
Since cryptographic operations are very expensive in
wireless sensor networks, we propose a permutation
ciphering technique to protect data.
Our solution is dynamic as it allows nodes to join
the network at any time after deployment given that
this node has a valid public key. In our proposition,
the sink node does not have to be in range of the
routers. The sink node can reach all the routers of
the network in a guarantees hop-by-hop manner. The
security aspect of our proposition is still in progress.
We are working on evaluations on telosB motes.
This work is partially funded by FEDER (Euro-
pean fund for regional development).
REFERENCES
Akkaya, K. and Younis, M. (2005). A survey on routing
protocols for wireless sensor networks. Ad hoc net-
works, 3:325–349.
Chalhoub, G., Guitton, A., Jacquet, F., Freitas, A., and Mis-
son, M. (2008a). Medium access control for a tree-
based wireless sensor network: Synchronization man-
agement. In IFIP Wireless Days.
Chalhoub, G., Guitton, A., and Misson, M. (2008b). MAC
specifications for a WPAN allowing both energy sav-
ing and guaranted delay - Part A: MaCARI: a synchro-
nized tree-based mac protocol. In IFIP WSAN.
HART (2008). HART field communication protocol spec-
ifications. Technical report, HART Communication
Foundation Std.
Hong, P. (2008). Feasibility of pkc in resource-constrained
wireless sensor networks. In ICCIT.
IEEE 802.15 (2006). Part 15.4: Wireless medium ac-
cess control (MAC) and physical layer (PHY) spec-
ifications for low-rate wireless personal area networks
(WPANs). Standard 802.15.4 R2006, ANSI/IEEE.
ISA (2009). ISA100.11a:2009 wireless systems for indus-
trial automation: Process control and related applica-
tions. Draft standard, in preparation, International So-
ciety of Automation Std.
Jones, K., Wadaa, A., Oladu, S., Wilson, L., and Eltoweissy,
M. (2003). Towards a new paradigm for securing
wireless sensor networks. In New Security Paradigms
Workshop.
Kavitha1, T. and Sridharan, D. (2010). Security vulnerabil-
ities in wireless sensor networks: A survey. Journal
of Information Assurance and Security, 5:31–44.
Kerkez, B., Watteyne, T., Magliocco, M., Glaser, S., and
Pister, K. (2009). Feasibility analysis of optimal con-
troller design for adaptive channel hopping. In WS-
NPERF.
Lopez, J. and Dahab, R. (2000). An overview of ellip-
tic curve crytography. Technical report, University of
Campinas.
Perrig, A., Szewczyk, R., Tygar, J., Wen, V., and Culler,
D. (2002). SPINS: Security protocols for sensor net-
works. Wireless Networks.
Pister, K. and Lance, D. (2006). TSMP: time synchronized
mesh protocol. In Distributed sensor networks.
Watteyne, T., Mehta, A., and Pister, K. (2009). Reliabil-
ity through frequency diversity: Why channel hopping
makes sense. In PE-WASUN.
Zigbee (2008). Zigbee Specification. Zigbee Standard
053474r17, ZigBee Standards Organization.
PECCS 2011 - International Conference on Pervasive and Embedded Computing and Communication Systems
282