KILAVI Wireless Communication Protocol for the Building Environment – Networking Issues

The KILAVI communication protocol is developed for low-power and low data rate wireless communication in the building environment. The KILAVI network links together building control and monitoring applications into an intelligent self-configurable system that can be easily controlled and monitored by the consumer through wireless and wired interfaces either locally or remotely. A KILAVI network consists of master, intermediate and sensor nodes. The master manages communication in the network, handles security, carries out node registration, and initiates the device control and monitoring tasks. Intermediate nodes are sensor/control nodes with data relaying capability that may be used to implement a multi-hop network. Power scarce sensors are primarily kept in the sleep state to minimize power consumption. Sensors wake up only to transfer or query data. Lifetime analysis on practical KILAVI nodes shows very promising results

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Yee Wei Law,et al.  Benchmarking block ciphers for wireless sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[4]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  M. Keskilammi,et al.  Indoor propagation comparison between 2.45 GHz and 433 MHz transmissions , 2002, IEEE Antennas and Propagation Society International Symposium (IEEE Cat. No.02CH37313).

[7]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[8]  Dong Seong Kim,et al.  GBR: Grid Based Random Key Predistribution for Wireless Sensor Network , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[11]  A. Wacker,et al.  A key-distribution scheme for wireless home automation networks , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[12]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[13]  Helger Lipmaa,et al.  Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .

[14]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[15]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[16]  Alfred Menezes,et al.  PGP in Constrained Wireless Devices , 2000, USENIX Security Symposium.

[17]  Mani Srivastava,et al.  Energy-aware wireless sensor networks , 2002 .

[18]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[19]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..