Abstract
Security is one of the fundamental problems in wireless sensor and ad hoc networks. Properties specific to such networks make it hard to apply traditional security solutions and require the design and analysis of new security mechanisms.
Many attacks are very powerful, but either not specific to wireless sensor and ad hoc networks or of little algorithmic interest, for example eavesdropping or injection of faulty traffic, radio jamming, or tampering with the hardware. Although of independent interest, we will not consider these issues in the following, and instead delve into the problem of distributing cryptographic keys securely.
The problem of distributing symmetric or asymmetric keys has always been a nuisance in applied cryptography: Before two parties can establish a secure communication channel C, they first need another secure communication channel C k over which they can negotiate the key required for establishing C In wireless sensor and ad hoc networks, this problem turns out to have solutions that look quite different from those in more traditional settings.
We start with giving a brief overview of security issues and to the cryptographic basics that are required to understand why distribution of cryptographic keys is a necessary condition for secure communication. Then, we delve into the key distribution issue. Section 16.2 deals with the symmetric case, and Section 16.3 with the asymmetric case.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Blaß, EO., Fabian, B., Fischmann, M., Gürses, S.F. (2007). Security. In: Wagner, D., Wattenhofer, R. (eds) Algorithms for Sensor and Ad Hoc Networks. Lecture Notes in Computer Science, vol 4621. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74991-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-74991-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74990-5
Online ISBN: 978-3-540-74991-2
eBook Packages: Computer ScienceComputer Science (R0)