Secure Overlay for Service Centric Wireless Sensor Networks

  • Hans-Joachim Hof
  • Erik-Oliver Blaß
  • Martina Zitterbart
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3313)


Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided by other sensor nodes. To give sensor nodes the possibility to offer services and to network-wide search for available services, some kind of lookup facility is needed. Several possibilities exist to realize service lookup in traditional networks and ad-hoc networks [ALM03, GOL99, GUT99, PRE02, SAL99, ZHU03]. In this paper we present Secure Content Addressable Networks Version 2 (SCANv2), a secure overlay focusing especially on wireless sensor networks. The paper describes how this secure overlay can be used among other things to offer lookup functionality in sensor networks. The design of the overlay focuses on secure service lookups. The overlay is part of the Karlsruhe Sensor Network Platform K-SNeP, a modular and flexible architecture for service centric sensor networks. Key areas of application of the architecture are gradually extendable service centric sensor networks where sensors and actuators jointly perform various user defined tasks, e.g. in the field of an office environment or health care.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [ALM03]
    Almenárez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and I-FIP Workshop on Next Generation Networks, Budapest, Ungarn (2003)Google Scholar
  2. [BAL02]
    Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), Xerox Palo Alto Research Center, Palo Alto, USA (2002)Google Scholar
  3. [EMU04] (accessed on, 09.03.2004)
  4. [GRE04] (accessed on 09.03.2004)
  5. [GOL99]
    Goland, Y., Cai, T., Leach, P., Gu, Y., Albright, S.: Simple service discovery Protocol/1.0 operationg without an arbiter. Internet Draft, IETF (1999)Google Scholar
  6. [GUT99]
    Guttman, E., Perkins, C., Veizades, J., Day, M.: Service Location Protocol, Version 2. IETF RFC2608 (1999)Google Scholar
  7. [HOF04]
    Hof, H.-J., Blaß, E.-O., Furhmann, T., Zitterbart, M.: Design of a Secure Distributed Service Directory for Wireless Sensornetworks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 276–290. Springer, Heidelberg (2004)Google Scholar
  8. [KOB94]
    Koblitz, N.: A course in number theory and cryptography, 2nd edn. Springer, Berlin (1994)Google Scholar
  9. [MAX04]
    Maxime: Java-Powered Cryptographic iButton (2004), (accessed on, 09.03.2004)
  10. [MAY02]
    Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 53. Springer, Heidelberg (2002)Google Scholar
  11. [MAZ99]
    Mazières, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: 17th Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island (1999)Google Scholar
  12. [PRE02]
    Preuß, S.: JESA Service Discovery Protocol: Efficient Service Discovery in Ad-Hoc Networks. In: 2nd International IFIP-TC6 Networking Conference, Pisa, Italien (2002)Google Scholar
  13. [RAT01]
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of ACM SIGCOMM 2001 (August 2001)Google Scholar
  14. [ROW01]
    Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)Google Scholar
  15. [SAL99]
    The Salutation Consortium: Salutation Architecture Specification Version 2.0c (1999),
  16. [STA02]
    Stajano, F.: Security for ubiquitous computing. John Wiley & Sons, West Sussex (2002)Google Scholar
  17. [STO01]
    Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Technical Report TR-819, Massachusetts Institute of Technology, Cambridge, USA (March 2001)Google Scholar
  18. [ZHA01]
    Zhao, B.Y., Kubiatowicz, K.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing, Technical Report UCB//CSD-01-1141, Computer Science Division, U. C. Berkeley, Berkeley, USA (April 2001)Google Scholar
  19. [ZHU03]
    Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private and location-aware service discovery protocol supporting mobile services. In: 1st IEEE International Conference on Pervasive Computing and Communications (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hans-Joachim Hof
    • 1
  • Erik-Oliver Blaß
    • 1
  • Martina Zitterbart
    • 1
  1. 1.Institut of TelematicsUniversity of Karlsruhe 

Personalised recommendations