Confidentiality and integrity of wireless data transmissions are vital for sensor networks used in critical infrastructure assets. While the challenges could be addressed using standard encryption techniques, the sensors are often power-limited, bandwidth-constrained or too rudimentary to accommodate the power and latency overhead of robust encryption and decryption implementations. To address this gap, this chapter proposes a novel methodology in which data is split between two distinct wireless channels to achieve acceptable levels of data confidentiality and/or integrity. Threat scenarios are discussed in which an attacker gains access to one of the two communications channels to either eavesdrop on or modify data in transit. Given these threats, five data splitting methods are presented that employ the two-channel communications concept to detect and adapt to the attacks, and provide varying levels of data security. Additionally, a simple proof-of-concept packet structure is introduced that facilitates data transmission over the two channels in accordance with the data-splitting methods.
[1]
Jason Smith,et al.
The SIMON and SPECK lightweight block ciphers
,
2015,
2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[2]
Fan Zhang,et al.
Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node
,
2011,
Int. J. Sens. Networks.
[3]
G. Padmavathi,et al.
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
,
2009,
ArXiv.
[4]
Zhe-Ming Lu,et al.
Power evaluation methods for data encryption algorithms
,
2014,
IET Softw..
[5]
Philip Koopman,et al.
Cyclic redundancy code (CRC) polynomial selection for embedded networks
,
2004,
International Conference on Dependable Systems and Networks, 2004.
[6]
Hsiao-Chun Wu,et al.
Physical layer security in wireless networks: a tutorial
,
2011,
IEEE Wireless Communications.