Abstract
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Authentication Code (MAC) is presented. The proposed protocol is an ideal solution for wireless sensor networks and other resource-constrained devices where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.
Chapter PDF
Similar content being viewed by others
Keywords
References
J. P. Kaps, G. Gaubatz, and B. Sunar. Cryptography on a Speck of Dust. IEEE Computer Magazine, Feb. 2007, pp38-44.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks, 2002, pp521-534.
I. Mantin. Analysis of the Stream Cipher RC4. Master’s thesis, The Weizmann Institute of Science, 2001.
W. Stallings. Cryptography and Network Security, Principles and Practice. Prentice Hall, 2003.
S. Mitchell and K. Srinivasan. State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks. In proceedings of the 1st ACM international workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, 2004, pp112-118.
A. Stubblefield, J. loannidis, and A.D. Rubin. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. AT&T Labs Technical Report, Aug. 2001
S. Fluhrer, I. Mantin, and A. Shamir. Weakness in the Key Scheduling Algorithm of RC4. Proceedings, Workshop in Selected Areas of Cryptography, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zhang, C.N., Yu, Q., Huang, X., Yang, C. (2008). A Security Protocol for Wireless Sensor Networks. In: Miri, A. (eds) Wireless Sensor and Actor Networks II. WSAN 2008. IFIP – The International Federation for Information Processing, vol 264. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09441-0_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-09441-0_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09440-3
Online ISBN: 978-0-387-09441-0
eBook Packages: Computer ScienceComputer Science (R0)