Security co-existence of wireless sensor networks and RFID for pervasive computing

Recent advances in wireless networks and embedded systems have created a new class of pervasive systems such as Wireless Sensor Networks (WSNs) and Radio Frequency IDentification (RFID) systems. WSNs and RFID systems provide promising solutions for a wide variety of applications, particularly in pervasive computing. However, security and privacy concerns have raised serious challenges on these systems. These concerns have become more apparent when WSNs and RFID systems co-exist. In this article, we first briefly introduce WSNs and RFID systems. We then present their security concerns and related solutions. Finally, we propose a Linear Congruential Generator (LCG) based lightweight block cipher that can meet security co-existence requirements of WSNs and RFID systems for pervasive computing.

[1]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[2]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[3]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[4]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[5]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[6]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[7]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[8]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[9]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[10]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[11]  Yang Xiao,et al.  A Lightweight Secure Solution for RFID. , 2006 .

[12]  Dawn Xiaodong Song,et al.  Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.

[13]  T. Sejnowski,et al.  RFID authentication protocol for low-cost tags , 2001 .

[14]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[15]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[16]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[17]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[18]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[19]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[20]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[21]  Stephen A. Weis New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .

[22]  Donggang Liu,et al.  Detecting Misused Keys in Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[23]  Donggang Liu,et al.  Group-based key predistribution for wireless sensor networks , 2008, TOSN.

[24]  Yang Xiao,et al.  A lightweight secure protocol for wireless sensor networks , 2006, Comput. Commun..

[25]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[26]  Donald Ervin Knuth,et al.  The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .