Security architecture for wireless sensor networks using frequency hopping and public key management

The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt communications. In addition, we propose a time segmentation approach that enables frequency hopping time slotted communications. Nodes secretly exchange frequency hopping sequences that enable them to fight against jamming and eavesdropping.

[1]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[2]  Jianqing Ma,et al.  Frequency-hopping based Secure Schemes in Sensornets , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[3]  Steven D. Glaser,et al.  Feasibility Analysis of Optimal Controller Design for Adaptive Channel Hopping , 2009 .

[4]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[5]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[6]  Kristofer S. J. Pister,et al.  TSMP: TIME SYNCHRONIZED MESH PROTOCOL , 2008 .

[7]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[8]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[11]  Ankur Mehta,et al.  Reliability through frequency diversity: why channel hopping makes sense , 2009, PE-WASUN '09.

[12]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[13]  M. Misson,et al.  Medium access control for a tree-based wireless sensor network: Synchronization management , 2008, 2008 1st IFIP Wireless Days.

[14]  Pascale Minet,et al.  Node Coloring in a Wireless Sensor Network with Unidirectional Links and Topology Changes , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[15]  Gérard Chalhoub,et al.  MAC specifications for a WPAN allowing both energy saving and guaranteed delay - Part A: MaCARI: a synchronized tree-based MAC protocol , 2008, WSAN.

[16]  Choong Seon Hong,et al.  Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.

[17]  Tuan Dang,et al.  OCARI: Optimization of communication for Ad hoc reliable industrial networks , 2008, 2008 6th IEEE International Conference on Industrial Informatics.

[18]  Seog Chung Seo,et al.  A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks , 2006, EUC Workshops.