Skip to main content

μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks

  • Conference paper
Data Privacy Management and Autonomous Spontaneous Security (DPM 2012, SETOP 2012)

Abstract

Secure communication in wireless sensor networks (WSNs) not only needs to provide the basic security but also to defend various attacks. The challenge in providing security in this network is that the securing mechanism must be lightweight to make it implementable in resource-constrained nodes. In this paper we have devised a link layer protocol for securing unicast communication in wireless sensor network (WSN). The protocol (μSec) is developed in TinyOS platform which is an event-driven operating system used in WSN for networked applications. Our protocol supports the basic security features such as confidentiality, authentication and integrity along with defense against replay attacks. We have modified an existing cryptographic algorithm with a target to minimize computational overhead to make it implementable in WSN. A simple, counter based defense mechanism is proposed to thwart replay attack. Both qualitative and quantitative analyses are performed to measure the efficacy of the protocol. The protocol is compared with some of important security protocols developed around TinyOS. We claim that that μSec, in addition to basic security, thwarts replay attack with same overhead as in other protocols which have considered basic securities only. We further claim that the μSec requires 10% (avg.) less overhead compared to its competitor which also defends replay attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System Architecture Directions for Networked Sensors. ACM SIGPLAN Notice 35(11), 93–104 (2000)

    Article  Google Scholar 

  2. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Setworks. Communications of the ACM, Special Issue on Wireless Sensor Networks 47(6), 53–57 (2004)

    Google Scholar 

  3. Ghosal, A., Halder, S., DasBit, S.: A Dynamic TDMA Based Scheme for Securing Query Processing in WSN. Wireless Networks 18(2), 165–184 (2012)

    Article  Google Scholar 

  4. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. of 2nd Int’l Conf. SenSys, pp. 162–175 (2004)

    Google Scholar 

  5. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proc. of 7th Int’l Conf. MobiCom, pp. 189–199 (2001)

    Google Scholar 

  6. Li, T., Wu, H. Wang, X., Bao, F.: SenSec Design. I 2R Sensor Network Flagship Project (SNFP: Security part). Technical Report-TR v1.0 (February 2005)

    Google Scholar 

  7. Xue, Q., Ganz, A.: Runtime Security Composition for Sensor Networks (SecureSense). In: Proc. of IEEE VTC, vol. 5, pp. 2976–2980 (2003)

    Google Scholar 

  8. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: A Secure Sensor Network Communication Architecture. In: Proc. of 6th Int’l Conf. IPSN, pp. 479–488 (2007)

    Google Scholar 

  9. Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. In: Proc. of ACM Int’l Conf. CCS, pp. 96–205 (2001)

    Google Scholar 

  10. Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy. MIT Press (2000)

    Google Scholar 

  11. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proc. of 38th Annual Symposium FOCS, pp. 394–403 (1997)

    Google Scholar 

  12. Housley, R., Whiting, D., Ferguson, N.: Counter with CBC-MAC (CCM), Submitted to N.I.S.T. (June 3, 2002), http://csrc.nist.gov/encryption/modes/proposedmodes/

  13. Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  14. David, R.R., Marchany, R.C., Midkiff, S.F.: Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. In: Proc. of IEEE Workshop on Information Assurance, pp. 127–134 (2007)

    Google Scholar 

  15. Wheeler, D., Needham, R.: TEA, A Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  16. Murphy, S., Robshaw, M.: Essential Algebraic Structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 1–16. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  17. Levis, P., Lee, N.: TOSSIM: A Simulator for TinyOS Networks. User’s manual, in TinyOS Documentation (March 23, 2007)

    Google Scholar 

  18. Gay, D., Levis, P., Behren, R.V., Welsh, M., Brewer, E., Culler, D.: The nesC Language: A Holistic Approach to Network Embedded Systems. In: Proc. of Programming Language Design and Implementation, pp. 1–11 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghosal, A., Sur, S., DasBit, S. (2013). μSec: A Security Protocol for Unicast Communication in Wireless Sensor Networks. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35890-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35889-0

  • Online ISBN: 978-3-642-35890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics