Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks

被引:6
作者
Tiberti, Walter [1 ]
Caruso, Federica [1 ]
Pomante, Luigi [1 ]
Pugliese, Marco [1 ]
Santic, Marco [1 ]
Santucci, Fortunato [1 ]
机构
[1] Univ Aquila, I-67100 Laquila, Italy
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2020年 / 16卷 / 10期
关键词
Wireless sensor network security; cryptographic scheme; hybrid cryptography; topology-authenticated key; KEY DISTRIBUTION; MANAGEMENT;
D O I
10.1177/1550147720951673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.
引用
收藏
页数:19
相关论文
共 42 条
  • [1] Agrawal Lalita, 2020, Social Networking and Computational Intelligence. Proceedings of SCI-2018. Lecture Notes in Networks and Systems (LNNS 100), P457, DOI 10.1007/978-981-15-2071-6_36
  • [2] Ahlawat P, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), P321, DOI 10.1109/COMPTELIX.2017.8003987
  • [3] Akram A, 2007, 2007 INT C INT ADV S
  • [4] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [5] [Anonymous], **NON-TRADITIONAL**
  • [6] [Anonymous], 2016, Treatment manual., VPP, P1
  • [7] [Anonymous], **NON-TRADITIONAL**
  • [8] [Anonymous], 2016, IEEE ASME T MECHATRO, VPP, P1
  • [9] [Anonymous], **NON-TRADITIONAL**
  • [10] [Anonymous], **NON-TRADITIONAL**