Interconectando Clusters com Transparência em Rede de Sensores Sem Fio Segura
Abstract
A wireless sensor network is a collection of devices limited in low-powered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied directly in this environment. In this work, we present a hybrid protocol that treats the group key management scheme and the transparent cluster interconnection. It also treats the node-tampering problem, offering a simple solution to control the group key. The feasibility of this protocol was verified by simulation and we concluded that increasing the number of nodes in the network does not change the performance of the interconnection between any two clusters.
References
Basagni, S., Herrín, K., Bruschi, D. e Rosti, E. (2001) “Secure Pebblenets”. In Proc. of the ACM Int. Symp. On Mobile Ad Hoc Networking and computing, ACM Press, New York. pp 156-163.
Bechler, M., Hof, H. J., Kraft, D., Pählke, F. e Wolf, L. (2004) “A cluster-based security architecture for ad hoc networks”. IEEE INFOCOM.
Blaß, E.-O. e Zitterbart, M. (2005) “Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks”. Institute of Telematics, University of Karlsruhe. http://doc.tm.uka.de/tr/TM-2005-1.pdf, Março.
Du, W., Wang, R. e Ning, P. (2005) “An Efficient Scheme for Authenticating Public Keys in Sensor Networks”. MobiHoc’05. Illinois. USA. Maio.
Eschenauer, L. e Gligor, V. D. (2002) “A key-management scheme for distributed sensor networks”. In Proc. of the 9th ACM Conf. On Computer and Communications Security, pp. 41-47. Novembro.
Fokine, K. (2002) “Key management in ad hoc networks”. Master Thesis. http://www.ep.liu.se/exjobb/isy/2002/3322/. Setembro.
Ganesan, P., Venugopalan, R. Peddabachagari, P., Dean, A., Mueller, F. e Sichitiu, M. (2003) “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes”. Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, pp. 151-159.
Gura, N., Patel, A., Wander, A., Eberle, H. e Chang-Shantz, S. (2004) “Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs”. CHES’2004. Workshop on Cryptographic Hardware and Embedded Systems. Springer-Verlag. Agosto.
Hu, F. e Sharma, N. K. (2005) “Security considerations in ad hoc sensor networks”. Ad Hoc Networks 3. pp. 69-89.
Hubaux, J., Buttyan, L., e Capkun, S. (2001) “The quest for security in mobile ad hoc networks”. In Proc. ACM Symp. On Mobile Ad Hoc Networking and Computing (MobiHOC).
Kamal, A. B. M. (2004) “Adaptive Secure Routing in Ad Hoc Mobile Network”. Master of Science Thesis. Royal Institute of Technology. Sweden. Novembro.
Lenstra, A. K. e Verheul, E. R. (2001) “Selecting Cryptographic Key Sizes”. Journal of Cryptology: the Journal of the International Association for Cryptologic Research, 14(4): 255-293.
Malan, D. J., Welsh, M. e Smith, M.D. (2004) “A Public-Key Infrastructure for Key Distribuition in TinyOS Based Elliptic Curve Cryptography”. First IEEE International Conference on Sensor and Ad Hoc Communications and Networks.
Okabe, N., Sakane, S., Miyazawa, K., Kamada, K., Inoue, A. e Ishiyama, M. (2005) “Security Architecture for Networks using Ipsec and KINK”. SAINT’2005. International Symposium on Applications and the Internet. IEEE. Computer Society.
Perkins, C. e Belding-Royer, E. (2003) “Ad hoc on-demand distance vector (AODV) routing”. IETF Request for Comments, RFC 3561. Julho.
Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., e Tygar, J. D. (2001) “SPINS: security protocols for sensor networks”. In Proc. of the Seventh Annual Int. Conf. on Mobile Computing and Networking, pp 189-199.
Schneier, B. (1996) “Applied Cryptography: Protocols, Algorithms and Source code in C”. John Wiley & Sons, Inc. New York.
Shoup, V. (2000) "Practical threshold signatures". EUROCRYPT´00 pp. 207–220.
Stallings, W. (1999) “Cryptography and Network Security: Principles and Practice”. Second edition. Prentice Hall, Inc. New Jersey.
Zapata, M. G., e Asokan, N. (2002) “Securing ad hoc routing protocols”. Proc. ACM Workshop on Wireless Security (WiSe), ACM Press, pp. 1-10.
Zhou, L. e Haas, Z. J. (1999) “Securing ad hoc networks”. IEEE Networkd Magazine, 13(6), pp 24-30. Novembro/Dezembro.
