AAA-based infrastructure for industrial wireless sensor networks

Over the past years, the deployment of sensor networks in industrial environments has attracted much attention in several business domains. An increasing number of applications have been developed, ranging from defence, public security, energy management, traffic control to health care. Integration of these sensor networks within domains relying on AAA (Authentication, Authorization and Accounting) infrastructures leads to the definition of novel services and profitable leveraging opportunities, while reinforcing the overall sensor networks security. This paper proposes architectures and solutions for wireless sensor networks in the field of sensor bootstrapping, (re-)authentication, secure routing and co-ownership. This work is carried out in the recently started “TWISNet: Trustworthy Wireless Industrial Sensor Networks” project1.

[1]  Zhen Cao,et al.  EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK) , 2012, RFC.

[2]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[3]  Dan Simon,et al.  The EAP-TLS Authentication Protocol , 2008, RFC.

[4]  寺岡 文男,et al.  Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .

[5]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[6]  Maher Ben Jemaa,et al.  An EAP-EHash authentication method adapted to resource constrained terminals , 2010, Ann. des Télécommunications.

[7]  Samita Chakrabarti,et al.  Protocol for Carrying Authentication for Network Access (PANA) Relay Element , 2011, RFC.

[8]  Zhen Cao,et al.  EAP Extensions for the EAP Re-authentication Protocol (ERP) , 2012, RFC.

[9]  Hannes Tschofenig,et al.  Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method , 2009, RFC.

[10]  M. Olsson,et al.  LTE-SAE architecture and performance , 2007 .

[11]  Vidya Narayanan,et al.  EAP Extensions for EAP Re-authentication Protocol (ERP) , 2008, RFC.

[12]  Hannes Tschofenig,et al.  The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.

[13]  Pedro Brandão,et al.  An Advanced Authorization Framework for IP-based B 3 G Systems , .

[14]  Behçet Sarikaya,et al.  EAP-Sens: a security architecture for wireless sensor networks , 2008, WICON.

[15]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.