Avaliação de Mecanismos de Segurança em uma Plataforma para Redes de Sensores Sem Fio

  • Germano Guimarães UFPE
  • Eduardo Souto UFPE / UFAM
  • Judith Kelner UFPE
  • Djamel Sadok UFPE

Abstract


Wireless sensor networks have recently emerged as successful technologies in a number of applications. The need to build security services into them remains however a considerable challenge as the hardware used still shows serious processing and energy limitations. This work evaluates the impact of a number of security mechanisms on sensor nodes and the network as a whole. Hence a number of measurements were undertaken in a real sensor platform in order to establish accurately energy consumption for various encryption algorithms as well when none of these are used. To our knowledge this is an innovative piece of work that shows through both simulation and measurements that encryption algorithms have different impacts on throughput,

References

I. F. Akyildiz,W. Su, Y. Sankasubramaniam, and E. Cayirci. "Wireless Sensor Networks: A Survey", Computer Networks, 38:393-422, 2002.

W. Heinzelman, A. Chandrakasan, H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks", in Proc. 33rd Hawaii International Conference on System Sciences, Jan. 2000, pp. 1-10.

G. Guimarães, C. Silva, E.Souto, R.Gomes, J. Kelner and D. Sadok. "Impacto da Utilização de Mecanismos de Segurança em Nodos Sensores", Proceedings of the VI Workshop de Comunicação sem Fio e Computação Móvel, Oct. 2004.

G. Guimarães, E.Souto, J. Kelner and D. Sadok. "Impacto da Utilização de Mecanismos de Segurança em Redes de Sensores Sem Fio", Proceedings of the XXIII Simpósio Brasileiro de Redes de Computadores, Fortaleza, Mai. 2005.

L. C. Zhong, J. M. Rabaey, A. Wolisz, "An integrated data-link energy model for wireless sensor networks", in Proc. International Conference on Communications, Jun. 2004.

R. A. F. Mini, A. A. F. Loureiro, B. Nath, "Prediction-based energy map for wireless sensor networks", in Proc. 8th IFIP Personal Wireless Communications, pp. 12-26, Set. 2003.

C. Karlof, D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", in Proc. 1st IEEE International Workshop on Sensor Network Protocols and Applications, Mai. 2003.

A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D. E. Culler, "SPINs: Security Protocols for Sensor Networks", in Proc. 7th Annual International Conference on Mobile Computing and Networks, Jul. 2001.

D. Liu, P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks", in Proc. 10th ACM Conf. on Computer and Communication Security, Out. 2003.

P. Silva, F. Teixeira, W. Chi, José Marcos Nogueira, "Aspectos de Detecção de Intrusos em Redes de Sensores sem Fio", in Proc. 22nd Simpósio Brasileiro de Redes de Computadores, Mai. 2004.

P. Ganesan, R. Venugopalan, P. Peddabachagari, A. Dean, F. Mueller, M. Sichitiu, "Analyzing and Modelling Encryption Overhead for sensor Network Nodes", in Proc. 2nd ACM International Conference on Wireless Sensor Networks and Applications, Set. 2003, pp. 151-159

D. Malan, "Crypto for Tiny Objects", Harvard University, Tech. Rep. TR-04-04, Jan. 2004.

Y. W. Law, J. Doumen, P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks", in Proc. 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, Oct 2004, to appear.

Karlof. C, Sastry. N, Wagner. David, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of ACM SenSys 2004, November 2004.

S. Liu, O. V. Gavrylyako, P. G. Bradford, "Implementing the TEA algorithm on Sensors", in Proc. 42nd Annual Southeast Regional Conference, 2004, pp. 64-69.

R. L. Rivest, "The RC5 Encryption Algorithm", in Proc. 1994 Leuven Workshop on Fast Software Encryption, 1995, pp. 86-96.

Rivest, R., Robshaw, M., Sidney, R., Yin, Y., "The RC6 Block Cipher" Specification version 1.1 (1998)

Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, Mani B. Srivastava, "On Communication Security in Wireless Ad-Hoc Sensor Networks", Proceedings of the 11th IEEE International Workshops on Enabling Technologies: infrastructure for Collaborative Enterprises, June 10-12, 2002

"SkipJack and KEA algorithm Specifications". National Institute of Standards and Technology, Mai. 1998.

"Data Encryption Standard (DES)", National Institute of Standards and Technology, Dez. 1993.

J. Daemen, V. Rijmen, "AES Proposal: Rijndael", Mar. 1999.

G. Yuval, "Reinventing the Travois: Encryption/MAC in 30 ROM bytes", in Proc. 4th Workshop on Fast Software Encryption", 1997.

MICA2: Wireless Measurement System. Disponível: [link].

Processador Atmega128L. Disponível: http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf

ChipCon CC1000 radio. Disponível: http://www.chipcon.com/files/CC1000_Data_Sheet_2_1.pdf

J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, K. S. J. Pister, "System Architecture directions for networked sensor", in Proc. 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000.

D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, D. Culler. "The nesC Language: A Holistic Approach to Networked Embedded Systems" in Proc. Programming Language Design and Implementation, Jun. 2003.

Mihir Bellare, Joe Kilian, Phillip Rogaway. "The Security of the Cipher Block Chaining Message Authentication Code". Journal of Computer and System Sciences, vol 3, Dez. 2000, pp. 362-399.

Shnayder, V., Hempstead, M., rong Chen, B., Werner-Allen, G., and Welsh, M. "Simulating the power consumption of large-scale sensor network applications." In ACM SenSys 2004 (Baltimore, MD, USA, Nov. 2004), ACM Press.

J. Polastre, D. Culler. "B-mac: An adaptive csma layer for low-power operation" , UC Berkeley, Tech. Rep cs294-f03/bmac, December 2003.
Published
2005-09-26
GUIMARÃES, Germano; SOUTO, Eduardo; KELNER, Judith; SADOK, Djamel. Avaliação de Mecanismos de Segurança em uma Plataforma para Redes de Sensores Sem Fio. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 5. , 2005, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2005 . p. 152-165. DOI: https://doi.org/10.5753/sbseg.2005.21530.

Most read articles by the same author(s)

1 2 > >>