Security in ad-hoc sensor networks with pre-loaded Time Limited Memory Keys

Securing information in ad-hoc networks [1] is a non-trivial task due to the nature of their structure. Radio communication between sensors requires encryption of the messages and physical implementation of the sensor nodes in real environment requires from the node to be tamper-protected. It is very hard to comply with these two demands, because physical tamper-protection, in most cases, is unachievable. Encryption is usually either non-symmetric or symmetric. The latter is very sensitive to key revival. It is hard to distribute key securely and more — to keep at secret during operating time. This article describes Time Limited Memory Keys (TLMK) protocol of key distribution/storage for the ad hoc sensor network based on smart sensors with limited CPU power resources. Originally protocol is designed to fulfill MICA2/MICA2DOT platform [2] specification.

[1]  Athanasios V. Vasilakos,et al.  Body Area Networks: A Survey , 2010, Mob. Networks Appl..

[2]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[3]  Klas Fokine Key Management in Ad Hoc Networks , 2002 .

[4]  M. Ivimey Annual report , 1958, IRE Transactions on Engineering Writing and Speech.

[5]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[6]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[7]  Dharma P. Agrawal,et al.  Scalable security schemes for ad hoc networks , 2002, MILCOM 2002. Proceedings.

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[10]  Khushboo Tripathi,et al.  Performance of DSDV Protocol over Sensor Networks , 2010 .

[11]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[12]  Jong-Tae Park,et al.  Energy-efficient MAC protocols for wireless body area networks: Survey , 2010, International Congress on Ultra Modern Telecommunications and Control Systems.

[13]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  Jean-Yves Le Boudec,et al.  The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks , 2001 .

[16]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .