Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4621))

  • 1058 Accesses

Abstract

Security is one of the fundamental problems in wireless sensor and ad hoc networks. Properties specific to such networks make it hard to apply traditional security solutions and require the design and analysis of new security mechanisms.

Many attacks are very powerful, but either not specific to wireless sensor and ad hoc networks or of little algorithmic interest, for example eavesdropping or injection of faulty traffic, radio jamming, or tampering with the hardware. Although of independent interest, we will not consider these issues in the following, and instead delve into the problem of distributing cryptographic keys securely.

The problem of distributing symmetric or asymmetric keys has always been a nuisance in applied cryptography: Before two parties can establish a secure communication channel C, they first need another secure communication channel C k over which they can negotiate the key required for establishing C In wireless sensor and ad hoc networks, this problem turns out to have solutions that look quite different from those in more traditional settings.

We start with giving a brief overview of security issues and to the cryptographic basics that are required to understand why distribution of cryptographic keys is a necessary condition for secure communication. Then, we delve into the key distribution issue. Section 16.2 deals with the symmetric case, and Section 16.3 with the asymmetric case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Dorothea Wagner Roger Wattenhofer

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Blaß, EO., Fabian, B., Fischmann, M., Gürses, S.F. (2007). Security. In: Wagner, D., Wattenhofer, R. (eds) Algorithms for Sensor and Ad Hoc Networks. Lecture Notes in Computer Science, vol 4621. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74991-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74991-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74990-5

  • Online ISBN: 978-3-540-74991-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics