Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11964254_5guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Tiny 3-TLS: a trust delegation protocol for wireless sensor networks

Published: 20 September 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Adapting security protocols to wireless sensor networks architectures is a challenging research field because of their specific constraints. Actually, sensors are computationally weak devices, unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie-Hellman). In this paper, we introduce Tiny 3-TLS, an extension and adaptation of TLS handshake sub-protocol that allows establishing secure communications between sensing nodes and remote monitoring terminals. Our protocol aims at guaranteeing the integrity and confidentiality of communications between sensors and distant terminals, after having established mutual authentication between the two parties. In order to achieve these security goals without putting too much burden on sensing devices, Tiny 3-TLS rely on an intermediate node, the sink node. Depending on the trustworthiness of this sink node and on the applications, we propose two versions of our proposition. Besides, we provide a formal validation of the protocol's security goals achievement and an evaluation of its computation and delay performances.

    References

    [1]
    http://compilers.cs.ucla.edu/avrora/, the Avrora project homepage.
    [2]
    http://www.avispa-project.org/, the AVISPA project homepage.
    [3]
    Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2004.
    [4]
    Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet. In Third IEEE International Conference on Pervasive Computing and Communications, March 2005.
    [5]
    Masmoudi, K., Hussein, M., Afifi, H., Seret, D.: Tri-party TLS Adaptation for Trust Delegation in Home Networks. In IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005.
    [6]
    Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol - Version 1.1. IETF RFC 4346, April 2006.
    [7]
    Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation, 48:203- 209, 1987.
    [8]
    Miller, V.: Uses of Elliptic Curves in Cryptography, In Advances in Cryptology, CRYPTO'85, LNCS 218, Springer-Verlag, pp. 417-462, 1985.
    [9]
    Chevalier, Y. et al.: A High-Level Protocol Specification Language for Industrial Security-Sensitive Protocols: www.avispa-project.org
    [10]
    Dolev, D. and Yao, A.:On the Security of Public-Key Protocols. IEEE Transactions on Information Theory, 2(29), 1983.
    [11]
    Basin, D., Modersheim, S. and Viganno, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security, 2004.
    [12]
    Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems, 16(3):872923, May 1994.
    [13]
    Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5
    [14]
    http://www.ist-magnet.org, IST MAGNET-Beyond project homepage.
    [15]
    IEEE Std. 802.1X-2004, Standards for Local and Metropolitan Area Networks: Port Based Network Acces Control.

    Cited By

    View all
    • (2019)Towards Touch-to-Access Device Authentication Using Induced Body Electric PotentialsThe 25th Annual International Conference on Mobile Computing and Networking10.1145/3300061.3300118(1-16)Online publication date: 5-Aug-2019
    • (2017)SecureSenseFuture Generation Computer Systems10.1016/j.future.2017.06.00877:C(40-51)Online publication date: 1-Dec-2017
    • (2010)Flexible key exchange negotiation for wireless sensor networksProceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization10.1145/1860079.1860090(55-62)Online publication date: 20-Sep-2010
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ESAS'06: Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
    September 2006
    192 pages
    ISBN:3540691723
    • Editors:
    • Levente Buttyán,
    • Virgil D. Gligor,
    • Dirk Westhoff

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 20 September 2006

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 29 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Towards Touch-to-Access Device Authentication Using Induced Body Electric PotentialsThe 25th Annual International Conference on Mobile Computing and Networking10.1145/3300061.3300118(1-16)Online publication date: 5-Aug-2019
    • (2017)SecureSenseFuture Generation Computer Systems10.1016/j.future.2017.06.00877:C(40-51)Online publication date: 1-Dec-2017
    • (2010)Flexible key exchange negotiation for wireless sensor networksProceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization10.1145/1860079.1860090(55-62)Online publication date: 20-Sep-2010
    • (2009)IPFIX for wireless sensors in home networksProceedings of the 2nd IFIP conference on Wireless days10.5555/1834116.1834180(349-353)Online publication date: 15-Dec-2009

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media