
STaR: Security Transparency and Reconfigurability
for Wireless Sensor Networks Programming
Roberta Daidone, Gianluca Dini and Marco Tiloca
Dipartimento di Ingegneria dell’Informazione, University of Pisa, Pisa, Italy
Keywords:
Security, Wireless Sensor Networks.
Abstract:
Wireless Sensor Networks (WSNs) are prone to security attacks. To protect the network from potential adver-
saries, it is necessary to secure communications between sensor nodes. If we consider a network of hetero-
geneous objects including WSNs, security requirements may be far more complex. A single application may
deal with different traffic flows, each one of which may have different security requirements, that possibly
change over time. In this paper, we present STaR, a software component which provides security transparency
and reconfigurability for WSNs programming. STaR allows for securing multiple traffic flows at the same time
according to specified security policies, and is transparent to the application, i.e. no changes to the original
application or the communication protocol are required. STaR can be easily reconfigured at runtime, thus
coping with changes of security requirements. Finally, we present our implementation of STaR for Tmote Sky
motes, and evaluate it in terms of memory occupancy, communication overhead, and energy consumption.
1 INTRODUCTION
In the recent years, Wireless Sensor Networks
(WSNs) have received an increasing amount of at-
tention and have been adopted in many application
scenarios, from environmental to healthcare monitor-
ing applications. In such scenarios, sensor nodes col-
lect environmental data, and transmit them to a central
base station through a wireless network. Sensor nodes
are typically resource constrained devices deployed in
unattended, possibly hostile environments. Given the
nature of WSNs, it is an easy task for an adversary to
eavesdrop messages and alter or inject fake ones. It
follows that secure communication is vital to assure
messages confidentiality, integrity, and authenticity.
WSNs have been used chiefly for scientific pur-
poses, where an adversary has little incentive to at-
tack sensors (Cardenas, A.A., Roosta, T., and Sastry,
S., 2009). Now WSNs are employed also in Coop-
erating Objects Systems (COS) where mobile physi-
cal agents share the same environment to fulfill their
tasks, either in group or in isolation (CONET, 2008;
PLANET, 2010). Such agents not only sense the envi-
ronment, but also act on it. COS are a tempting target
for an adversary, since a security infringement may
easily translate into a safety one, with possible conse-
quences in terms of damages to things and injures to
people. Same considerations hold for WSNs in Crit-
ical Infrastructures (Albano, M., Chessa, S., and Di
Pietro, R., 2008; Buttyan, L., Gessner, D., Hessler,
A., and Langendoerfer, P., 2010).
Many solutions have been devised for WSNs se-
curity, including (Karlof, C., Sastry, N., and Wagner,
D., 2004) for secure communication, (Wong, C.K.,
Gouda, M., and Lam, S.S., 2000; Su, Z., Lin, C.,
Ren, F., Jiang, Y., and Chu, X., 2009; Gu, W., Dutta,
N., Chellappan, S., and Xiaole, B., 2011; Maerien,
J., Michiels, S., Huygens, C., and Joosen, W., 2010;
Dini, G., and Tiloca, M., 2010) for key management,
and (Hyun, S., Ning, P., Liu, A., and Du, W., 2008;
Lanigan, P.E., and Gandhi, R., and Narasimhan, P.,
2006) for secure code dissemination. Particular atten-
tion has been paid to component-based security archi-
tectures tailored to WSNs (Matthys, N., Huygens, C.,
Hughes, D., Michiels, S., and Joosen, W., 2012; Dini,
G., and Savino, I.M., 2010).
We present STaR, a modular, reconfigurable and
transparent software component for secure commu-
nications in WSNs. STaR guarantees confidential-
ity, integrity, and authenticity by means of encryption
and/or authentication.
STaR is modular because it separates interfaces
from their implementations. This makes it easily
portable on different hardware (Moteiv Corporation,
2006; Crossbow Technology Inc., 2004) and network
stacks (IEEE, 2006; ZigBee Alliance, 2008). Modu-
35
Daidone R., Dini G. and Tiloca M..
STaR: Security Transparency and Reconfigurability for Wireless Sensor Networks Programming.
DOI: 10.5220/0004205200350040
In Proceedings of the 2nd International Conference on Sensor Networks (SENSORNETS-2013), pages 35-40
ISBN: 978-989-8565-45-7
Copyright
c
2013 SCITEPRESS (Science and Technology Publications, Lda.)