End-to-End Authentication in Under-Water Sensor Networks

被引:0
作者
Souza, Evaldo [1 ]
Wong, Hao Chi [2 ]
Cunha, Italo [1 ]
Loureiro, A. A. F. [1 ]
Vieira, L. F. M. [1 ]
Oliveira, Leonardo B. [1 ]
机构
[1] Univ Fed Minas Gerais, Belo Horizonte, MG, Brazil
[2] Intel Corp, Santa Clara, CA 95051 USA
来源
2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2013年
关键词
Aggregate Signatures; Authentication; Digital Signature Schemes; Security; Under-Water Sensor Networks; SECURITY; PROTOCOLS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Under-Water Wireless Sensor Networks (UWSNs) are a particular class of Wireless Sensor Networks (WSNs) in which sensors are located, as the name suggests, underwater. Applications of UWSNs range from oceanographic data collection to disaster prevention. UWSNs are vulnerable to attacks and because of their idiosyncrasies, security solutions for ground WSNs might not be applicable underwater. As a result, there is a need for mechanisms exclusively tailored to underwater environments. In this work we address the problem of authentication in UWSNs. We evaluate energy costs for different digital signature schemes for end-to-end authentication and discuss the tradeoff's involved in a number of scenarios. Our results show that schemes that perform well in ground WSN do not necessarily do well in UWSNs; and shed light on characteristics of a digital signature scheme that make them particularly suited to underwater networks.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[2]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[3]  
[Anonymous], 1 IEEE INT WORKSH SE
[4]  
[Anonymous], P 29 IEEE INT C COMP
[5]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[6]   SECURING UNDERWATER WIRELESS COMMUNICATION NETWORKS [J].
Carmen Domingo, Mari .
IEEE WIRELESS COMMUNICATIONS, 2011, 18 (01) :22-28
[7]  
Estrin D., 1999, MobiCom'99. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P263, DOI 10.1145/313451.313556
[8]  
GALINDO D, 2008, 7 INT C CRYPT NETW S, V5339, P120
[9]   Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller [J].
Gouvea, Conrado P. L. ;
Oliveira, Leonardo B. ;
Lopez, Julio .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) :19-29
[10]  
Handziski Vlado., 2004, Proceedings of the 2nd international conference on Embedded networked sensor systems, P277