Skip to main content

Security Enhanced WISPs: Implementation Challenges

  • Chapter
  • First Online:

Abstract

In this chapter we motivate the need for security in passive sensors. The powerful Wireless Identification and Sensing Platform (WISP) opens the field for new applications, which may raise the subject of privacy. We show that not only privacy requires security but new use cases are possible when sensors can protect their data. Our implementation of the Advanced Encryption Standard shows that state-of-the-art cryptography can be computed on the WISP without noticeable performance reduction. In addition, we show how encryption can be integrated into the WISP protocol without disturbing the communication of WISPs transmitting unencrypted data. Additionally, we illustrate the threat of side-channel analysis and provide evidence about the feasibility of these attacks on the WISP.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Stiftung Secure Information and Communication Technologies (SIC): AES Implementation for MSP430 Microcontroller. Available online at http://jce.iaik.tugraz.at/sic/Products/Crypto-Software-for-Microcontrollers/Texas-Instruments-MSP430-Microcontrollers

References

  1. S. Dominikus, E. Oswald, and M. Feldhofer. Symmetric authentication for RFID systems in practice. In Workshop on RFID and Lightweigth Crypto, July 13–15, 2005, Graz, Austria, 2005.

    Google Scholar 

  2. M. Dworkin. Recommendation for Block Cipher Modes of Operation - Methods and Techniques. Technical report, National Institute of Standards and Technology (NIST), December 2001.

    Google Scholar 

  3. EPCglobal. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz Version 1.0.9, January 2005. Available online at http://www.epcglobalinc.org/standards/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf.

  4. EPC Global Inc. Low level reader protocol (llrp). http://www.epcglobalinc.org/standards/llrp/llrp_1_0_1-standard-20070813.pdf, August 2007.

  5. M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a Grain of Sand. IEE Proceedings on Information Security, 152(1):13–20, October 2005.

    Article  Google Scholar 

  6. A. Kerckhoffs. La cryptographie militaire. Journal des sciences militaires, IX:5–38, January 1883.

    Google Scholar 

  7. P.C. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In Michael Wiener, (ed.) Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15–19, 1999, Proceedings, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397. Springer, 1999.

    Google Scholar 

  8. LANGER EMV-Technik GmbH. H-field probe lf-b 3. http://www.langer-emv.de/en/products/disturbance-emission/near-field-probes/lf-1/. Accessed 26 Dec 2012.

  9. S. Mangard, E. Oswald, and T. Popp. Power Analysis Attacks–Revealing the Secrets of Smart Cards. Springer, 2007. ISBN 978-0-387-30857-9.

    Google Scholar 

  10. National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist.gov/fipspubs/.

  11. T. Plos. Susceptibility of UHF RFID Tags to Electromagnetic Analysis. In Tal Malkin, (ed.) Topics in Cryptology - CT-RSA 2008, The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8–11, 2008, Proceedings, vol. 4964 of Lecture Notes in Computer Science, pp. 288–300. Springer, April 2008.

    Google Scholar 

  12. Texas Instruments Inc. MSP430F21x2 MIXED SIGNAL MICROCONTROLLER. Available at http://focus.ti.com/lit/ds/symlink/msp430f2132.pdf, December 2009.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Szekely .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Szekely, A., Höfler, M., Stögbuchner, R., Aigner, M. (2013). Security Enhanced WISPs: Implementation Challenges. In: Smith, J. (eds) Wirelessly Powered Sensor Networks and Computational RFID. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-6166-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-6166-2_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-6165-5

  • Online ISBN: 978-1-4419-6166-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics