Key management systems for sensor networks in the context of the Internet of Things

Computers & Electrical Engineering - Tập 37 Số 2 - Trang 147-159 - 2011
Rodrigo Román1, Cristina Alcaraz1, Javier López1, Nicolas Sklavos2
1Computer Science Department, University of Malaga, Campus de Teatinos 29071, Spain#TAB#
2Department of Informatics and MM, Technological Educational Institute of Patras, Greece

Tóm tắt

Từ khóa


Tài liệu tham khảo

INFSO D.4 Networked Enterprise and RFID INFSO G.2 Micro and Nanosystems, in co-operation with the Working group RFID of the ETP EPOSS, internet of things in 2020: roadmap for the future, 27 May 2008.

Ovidiu V, Harrison M, Vogt H, Kalaboukas K, Tomasella M, Wouters K, et al. Internet of things strategic research roadmap, European Commission – Information Society and Media DG, 2009.

National Intelligence Council, Disruptive Civil Technologies – six technologies with potential impacts on us interests out to 2025, Conference Report CR 2008-07, April 2008.

Akyildiz, 2002, Wireless sensor networks: a survey, Comput Networks, 38, 393, 10.1016/S1389-1286(01)00302-4

Wireless Systems for Automation. Available at: <http://www.isa.org/> (accessed on October, 2010).

IBM: a smarter planet. Available at: <http://www.ibm.com/smarterplanet/> (accessed on October 2010).

HP: a central nervous system for the earth. Available at: <http://www.hpl.hp.com/news/2009/oct-dec/cense.html> (accessed on October 2010).

Montenegro, 2007, RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 10.17487/rfc4944

Routing Over Low power and Lossy Networks (roll) Working Group. Internet Engineering Task Force (IETF). Available at: <http://datatracker.ietf.org/wg/roll/charter/> (accessed on October 2010).

Constrained RESTful Environments (core) Working Group. Internet Engineering Task Force (IETF). Available at: <http://datatracker.ietf.org/wg/core/charter/> (accessed on October 2010).

Guinard D, Fischer M, Trifa V. Sharing using social networks in a composable web of things. In: Eighth IEEE international conference on pervasive computing and communications workshops (PERCOM 2010), 2010. p. 702–7. doi:10.1109/PERCOMW.2010.5470524.

Libelium: Interfacing the Sensor Networks with the Web 2.0. Available at: <http://www.libelium.com/> (accessed on October 2010).

Roman, 2009, Integrating wireless sensor networks and the internet: a security analysis, Int Res, 19, 246

Christin, 2009, Wireless sensor networks and the internet of things: selected challenges, Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze

Alcaraz, 2010, A security analysis for wireless sensor mesh networks in highly critical systems, IEEE Trans Syst Man Cybern Part C: Appl Rev, 40, 419, 10.1109/TSMCC.2010.2045373

Healy M, Newe T, Lewis E. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In: Mukhopadhyay SC, Gupta GS, editors. Smart Sensors and Sensing Technology, vol. 20 of Lecture Notes in Electrical Engineering, Springer, Berlin, Heidelberg; 2008. p. 3–14. doi:10.1007/978-3-540-79590-2_1.

Francillon A, Castelluccia C. TinyRNG: A cryptographic random number generator for wireless sensors network nodes. In: Fifth international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt 2007), 2007. p. 1–7. doi:10.1109/WIOPT.2007.4480051.

Kushalnagar, 2007, RFC 4919: IPv6 over low-power wireless personal area networks (6LoWPANs): overview, Assumptions, Problem Statement, and Goals

Dierks, 2008, RFC 5246: The transport layer security (TLS) protocol version 1.2

OASIS Web Services Security (WSS) TC. Available at: <http://www.oasis-open.org/committees/wss/> (accessed on October 2010).

Amin S, Young YJ, Siddiqui M, Hong CS. A novel intrusion detection framework for IP-based sensor networks. In: International Conference on Information Networking (ICOIN 2009), 2009. p. 1–3.

Weber, 2010, Internet of things – new security and privacy challenges, Comput Law Security Rev, 26, 23, 10.1016/j.clsr.2009.11.008

Eronen, 2005, RFC 4279: pre-shared key ciphersuites for transport layer security (TLS), 10.17487/rfc4279

Rescorla, 2006, RFC 4347: datagram transport layer security, 10.17487/rfc4347

OASIS Web Services Secure Exchange (WS-SX) TC. Available at: <http://www.oasis-open.org/committees/ws-sx/> (accessed on October 2010).

Oliveira, 2010, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, Comput Commun

Bianchi G, Capossele AT, Mei A, Petrioli C. Flexible key exchange negotiation for wireless sensor networks. In: Proceedings of the fifth ACM international workshop on wireless network testbeds, experimental evaluation and characterization, WiNTECH ’10, New York, NY, USA: ACM; 2010. p. 55–62. http://doi.acm.org/10.1145/1860079.1860090.

Akyildiz, 2005, Underwater acoustic sensor networks: research challenges, Ad Hoc Networks, 3, 257, 10.1016/j.adhoc.2005.01.004

Pietro RD, Mancini L, Soriente C, Spognardi A, Tsudik G. Catch me (if you can): data survival in unattended sensor networks. In: Sixth annual IEEE international conference on pervasive computing and communications (PerCom 2008), 2008. p. 185–94. doi:10.1109/PERCOM.2008.31.

Johnson M, Healy M, van de Ven P, Hayes M, Nelson J, Newe T, et al. A comparative review of wireless sensor network mote technologies. In: IEEE Sensors 2009, 2009. p. 1439–42. doi:10.1109/ICSENS.2009.5398442.

Malan D, Welsh M, Smith M. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: First annual IEEE communications society conference on sensor and ad hoc communications and networks (IEEE SECON 2004), 2004. p. 71–80. doi:10.1109/SAHCN.2004.1381904.

Liu A, Ning P, TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, in: International Conference on Information Processing in Sensor Networks (IPSN 2008), 2008, pp. 245–256. doi:10.1109/IPSN.2008.47.

Rabin M. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep., Cambridge, MA, USA, 1979.

M.A.S., 2010, A survey on key management mechanisms for distributed wireless sensor networks, Comput Networks, 54, 2591, 10.1016/j.comnet.2010.04.010

Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In: Ninth ACM conference on computer and communications security (CCS 2002), 2002. p. 41–47. doi:10.1145/586110.586117.

Du, 2005, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans Inform Syst Security (TISSEC), 8, 228, 10.1145/1065545.1065548

Camtepe, 2007, Combinatorial design of key distribution mechanisms for wireless sensor networks, IEEE/ACM Trans Network, 15, 346, 10.1109/TNET.2007.892879

Liu, 2005, Establishing pairwise keys in distributed sensor networks, ACM Trans Inform Syst Security, 8, 41, 10.1145/1053283.1053287

Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE international conference on network protocols (ICNP 2004), 2004. p. 206–215. doi:10.1109/ICNP.2004.1348111.

Lai B, Kim S, Verbauwhede I. Scalable session key construction protocol for wireless sensor networks. In: IEEE workshop on large scale real-time and embedded systems (LARTES 2002), 2002.

Panja B, Madria S, Bhargava B. Energy and communication efficient group key management protocol for hierarchical sensor networks. In: Proceedings of the IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), vol. 1, 2006, p. 8. doi:10.1109/SUTC.2006.1636204.

Seshadri A, Luk M, Perrig A. SAKE: software attestation for key establishment in sensor networks, ad hoc networks, in press. doi:10.1016/j.adhoc.2010.08.011.

Jaworski, 2009, Random key predistribution for wireless sensor networks using deployment knowledge, Computing, 85, 57, 10.1007/s00607-009-0036-9

ATmega128, AVR Solutions. Available at: <http://www.atmel.com/dyn/products/product_card.asp?part_id=2018> (accessed on October 2010).

Dorn, 1962, Generalizations of Horner’s rule for polynomial evaluation, IBM J Res Develop, 6, 239, 10.1147/rd.62.0239

Menezes AJ, van Oorschot PC, Vanstone SA. Handbook of applied cryptography, CRC Press, 2001. Available at: <http://www.cacr.math.uwaterloo.ca/hac/>.