Secure Overlay for Service Centric Wireless Sensor Networks

Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided by other sensor nodes. To give sensor nodes the possibility to offer services and to network-wide search for available services, some kind of lookup facility is needed. Several possibilities exist to realize service lookup in traditional networks and ad-hoc networks [ALM03, GOL99, GUT99, PRE02, SAL99, ZHU03]. In this paper we present Secure Content Addressable Networks Version 2 (SCANv2), a secure overlay focusing especially on wireless sensor networks. The paper describes how this secure overlay can be used among other things to offer lookup functionality in sensor networks. The design of the overlay focuses on secure service lookups. The overlay is part of the Karlsruhe Sensor Network Platform K-SNeP, a modular and flexible architecture for service centric sensor networks. Key areas of application of the architecture are gradually extendable service centric sensor networks where sensors and actuators jointly perform various user defined tasks, e.g. in the field of an office environment or health care.

[1]  Stephan Preuß JESA Service Discovery Protocol , 2002, NETWORKING.

[2]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[3]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[4]  Paul J. Leach,et al.  Simple Service Discovery Protocol/1.0 , 1999 .

[5]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[6]  David Mazières,et al.  Separating key management from file system security , 2000, OPSR.

[7]  Hans-Joachim Hof,et al.  Design of a Secure Distributed Service Directory for Wireless Sensornetworks , 2004, EWSN.

[8]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[9]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[10]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[11]  Ben Y. Zhao,et al.  Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and , 2001 .

[12]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[13]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[14]  Celeste Campo,et al.  SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks , 2003 .

[15]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[16]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.