DocumentCode :
1728160
Title :
Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach
Author :
Stelle, S. ; Manulis, M. ; Hollick, M.
Author_Institution :
Cryptographic Protocols Group, Tech. Univ. Darmstadt, Darmstadt, Germany
fYear :
2012
Firstpage :
28
Lastpage :
37
Abstract :
Secure initialization of sensor nodes with cryptographic keys is inherent to all security protocols and applicationsin the area of wireless sensor networks (WSN).We introduce a general framework, denoted TOPKEY, thatprovides tool assistance and performs secure initialization ofsensor nodes with cryptographic keys over the air by leveraging the transmission power to confine the area in which potential attackers can eavesdrop on communication. Our analysis shows that physical protection based on transmission power may, inpractice, lead to an acceptable level of key deployment security. Besides the fully automated key deployment, TOPKEY supports a five-step initialization process, suited to off-the-shelf sensor nodes that come without any pre-installed operating system. TOPKEY is currently tailored to static WSN topologies: it supports topology design and deploys topology-driven key generation for a range of WSN communication patterns. We implemented the framework and analyzed its performanceand scalability for commodity TelosB nodes and Contiki OS. Our analysis, performed with respect to different WSN topologies, shows that TOPKEY can be used to securely initialize a static network of about 100 nodes in less than one minute.
Keywords :
cryptographic protocols; telecommunication network topology; telecommunication security; wireless sensor networks; Contiki OS; TOPKEY; WSN communication patterns; commodity TelosB nodes; cryptographic keys; five-step initialization process; fully automated key deployment; key deployment security; off-the-shelf sensor nodes; physical protection; security protocols; static WSN topologies; static network; tool assistance; topology design; topology-driven key generation; topology-driven secure initialization; transmission power; wireless sensor networks; Cryptography; Network topology; Performance evaluation; Topology; Usability; Wireless sensor networks; cryptography; embedded security; secure initialization; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4673-2244-7
Type :
conf
DOI :
10.1109/ARES.2012.36
Filename :
6329269
Link To Document :
بازگشت