LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network

  • Riaz Ahmed Shaikh
  • Sungyoung Lee
  • Mohammad A. U. Khan
  • Young Jae Song
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4217)

Abstract

Constraint specific wireless sensor networks need energy efficient and secure communication mechanisms. In this paper we propose Lightweight Security protocol (LSec) that fulfils both requirements. LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme. It also provides confidentiality of data and protection mechanism against intrusions and anomalies. LSec is memory efficient that requires 72 bytes of memory storage for keys. It only introduces 74.125 bytes of transmission and reception cost per connection.

References

  1. 1.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc. of the First IEEE International Workshop on Sensor Network Protocols and Applications (WSNA 2003), May 2003, pp. 113–127 (2003)Google Scholar
  2. 2.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of INFOCOM (March 2004) 2004Google Scholar
  3. 3.
    L. Ray.: Active Security Mechanisms for Wireless Sensor Networks and Energy optimization for passive security Routing, PhD Dissertation, Dep. of Computer Science, Louisiana State University (August 2005)Google Scholar
  4. 4.
    Kohl, J., Clifford Neuman, B.: The Kerberos Network Authentication Service (v5)., RFC 1510 (September 1993)Google Scholar
  5. 5.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transaction on Information Theory 22, 644–654 (1976)MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining Digital Signatures and Public key cryptosystem. Communication of ACM 21(2), 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Erik-Oliver,B., Martina, E.: Towards Acceptable Public-Key Encryption in Sensor Networks. In: Proc. of 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS (May 2005)Google Scholar
  8. 8.
    Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A Survey., Technical Report MIST-TR-2005-007 (July 2005)Google Scholar
  9. 9.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. of 7th annual international conference on Mobile computing and networking, Rome, Italy, August 2001, pp. 188–189 (2001)Google Scholar
  10. 10.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proc. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, November 2004, pp. 162–175 (2004)Google Scholar
  11. 11.
    Jones, K., Wadaa, A., Oladu, S., Wlson, L., Etoweissy, M.: Towards a new paradigm for securing wireless sensor networks. In: Proc. of the 2003 workshop on New security paradigms, Ascona, Switzerland, August 2003, pp. 115–121 (2003)Google Scholar
  12. 12.
    Park, T., Shin, K.G.: LiSP: A Lightweight Security Protocol for Wireless Sensor Networks. ACM Transactions on Embedded Computing Systems 3(3), 634–660 (2004)CrossRefGoogle Scholar
  13. 13.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM conference on Computer and communications security, Washington, USA, pp. 62–72 (2003)Google Scholar
  14. 14.
    Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications, 38–43 (December 2004)Google Scholar
  15. 15.
    Sensor Network Simulator and Emulator (SENSE), http://www.cs.rpi.edu/~cheng3/sense/

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Riaz Ahmed Shaikh
    • 1
  • Sungyoung Lee
    • 1
  • Mohammad A. U. Khan
    • 1
  • Young Jae Song
    • 1
  1. 1.Department of Computer EngineeringKyung Hee UniversityGyeonggi-doSouth Korea

Personalised recommendations