Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks

Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing power and available memory are challenging factors. Additionally, a typical characteristic of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication paths. In this paper we describe a new approach and an according protocol for usage in ad hoc networks that provides reliable as well as semi-reliable communication services in combination with security services. Thus, the proposed methodology allows to ensure data integrity and message authentication. The main aspects during the development were the limitations of typical sensor nodes used in ad hoc networks in terms of available storage, processing power, and energy. Our solution provides the capability of acknowledging correct receptions as well as the check of data integrity and message authentication in a single step. Therefore, a low overhead solution applicable to wireless sensor networks was created providing all the mentioned communication goals.

[1]  Eitan Altman,et al.  A survey of TCP over ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[2]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[3]  Gene Tsudik,et al.  Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks , 1999, DIALM '99.

[4]  Falko Dressler,et al.  Self-Organization in Ad Hoc Networks: Overview and Classification , 2006 .

[5]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[6]  J. Heidemann,et al.  A Flexible and Reliable Radio Communication Stack on Motes , 2002 .

[7]  Raghupathy Sivakumar,et al.  TCP performance over mobile ad hoc networks: a quantitative study , 2004, Wirel. Commun. Mob. Comput..

[8]  Nitin H. Vaidya,et al.  Analysis of TCP Performance over Mobile Ad Hoc Networks , 1999, Wirel. Networks.

[9]  Bogdan M. Wilamowski,et al.  The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.

[10]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[11]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[12]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[13]  Reinhard German,et al.  Self-Organization in Sensor Networks using Bio-Inspired Mechanisms , 2005, ARCS Workshops.

[14]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[15]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[16]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[17]  Michael A. Ramalho,et al.  Stream Control Transmission Protocol (SCTP) Partial Reliability Extension , 2004, RFC.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Kwangjo Kim,et al.  State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[20]  Falko Dressler Locality Driven Congestion Control in Self-Organizing Wireless Sensor Networks , 2005 .

[21]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[22]  Lixia Zhang,et al.  Stream Control Transmission Protocol , 2000, RFC.