Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014, Communications in Computer and Information Science
…
12 pages
1 file
The Internet of Things is imposing an evolution of the capabilities of wireless sensor networks. The new IP-based 6LoWPAN standard for low power sensor networks allows an almost seamless connection of local sensor networks to the Internet. This makes it easier to connect local sensor networks to data processing servers or to provide web services for those networks. On the other hand, the connection to the Internet also opens doors for unauthorized nodes to become part of the local network. Therefore, measures need to be taken to protect the information that is captured and communicated within the local network. The most important challenge in doing so, is the implementation of a key management architecture, keeping in mind that the sensor nodes are constrained in power consumption and data storage capacity. This paper builds on a previously proposed symmetric key management scheme for 6LoWPAN networks. The original scheme is based on wired bootstrapping for the enrollment of new nodes, while the paper at hand proposes a wireless method for key pre-distribution. We analyze the original wired scheme and its shortcomings. Next, we propose the new wireless scheme and elaborate on the practical implementation on Zolertia Z1 nodes running Contiki-OS. We show that it is possible to provide end-to-end security using wireless bootstrapping within the constraints of the tiny nodes at hand.
Communications in Computer and Information Science, 2014
The Internet of Things is imposing an evolution of the capabilities of wireless sensor networks. The new IP-based 6LoWPAN standard for low power sensor networks allows an almost seamless connection of local sensor networks to the Internet. This makes it easier to connect local sensor networks to data processing servers or to provide web services for those networks. On the other hand, the connection to the Internet also opens doors for unauthorized nodes to become part of the local network. Therefore, measures need to be taken to protect the information that is captured and communicated within the local network. The most important challenge in doing so, is the implementation of a key management architecture, keeping in mind that the sensor nodes are constrained in power consumption and data storage capacity. This paper builds on a previously proposed symmetric key management scheme for 6LoWPAN networks. The original scheme is based on wired bootstrapping for the enrollment of new nodes, while the paper at hand proposes a wireless method for key pre-distribution. We analyze the original wired scheme and its shortcomings. Next, we propose the new wireless scheme and elaborate on the practical implementation on Zolertia Z1 nodes running Contiki-OS. We show that it is possible to provide end-to-end security using wireless bootstrapping within the constraints of the tiny nodes at hand.
2018
The concept of the Internet of Things (IoT) is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. Among many underlying networking technologies for the IoT, Wireless Sensor Network (WSN) technology has become an integral building block. IoT enabled sensor networks provide a wide range of application areas such as smart homes, connected healthcare, smart cities and various solutions for the manufacturing industry. The integration of WSNs in IoT will also create new security challenges for establishing secure channels between low power sensor nodes and Internet hosts. This will lead to many challenges in designing new key establishment and authentication protocols and redefining the existing ones. This dissertation addresses how to integrate lightweight key management and authentication solutions in the resource constrained sensor networks deployed in IoT domains. Firstly, this thesis elaborates how to exploit the implicit certificates to initiate secure End-to-End (E2E) communication channels between the resource constrained sensor nodes in IoT networks. Implicit certificates are used for authentication and key establishment purposes. The compliance of the security schemes is proven through performance evaluations and by discussing the security properties. Secondly, this dissertation presents the design of two lightweight group key establishment protocols for securing group communications between resource-constrained IoT devices. Finally, the thesis explores promising approaches on how to tailor the existing security protocols in accordance with IoT device and network characteristics. In particular, variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections between the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. A solutions called Collaborative HIP (CHIP) is proposed with an efficient key establishment component for the high resource-constrained devices on the IoT. The applicability of the keying mechanism is demonstrated with the implementation and the performance measurements results.
IEEE, 2021
This paper describes a design of a lightweight authentication solution for the 6LoWPAN based Wireless Sensor Network. 6LoWPAN nodes are classified as constrained devices with limited memory and computing power. Therefore, since confidential data is shared in various fields through a public channel, the underlying resources are vulnerable to security threats. Moreover, constrained devices make it impossible to secure information using traditional resourceintensive encryption algorithms such as biometric, username, and password. Therefore, a variety of symmetric cryptographic and public key-based authentication methods have been proposed to address such issues. Conversely, the solutions still suffer from large communication and computational overhead problems and do not resist some known attacks. Our proposed framework aims to reduce computing and communication costs by using lightweight authentication-based symmetric key management. It employs a hash-based method, pre-distribution key, track sequence, nonce, and symmetric Lici-2 algorithm in both phases (establishment and authentication). This proposal framework is expected to resist attacks as exemplified by to reply and man in the middle.
2007
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. In this paper, we focus on the key management issues in IP-based ubiquitous sensor networks. 6LoWPAN (IPv6 over Low Power Personal Area Network) is analyzed for its vulnerability to security threats and suitable security mechanisms. Our analysis ascertains that the preassigned key-based security is prone to failures. Such networks need a dynamic key management mechanism to establish a secure communication. For the sake of analysis, we select one of the possible key management solutions in 6LoWPANs—the Public Key Infrastructur...
In day to day life almost everyone is using wireless sensor based networks which are very sensitive in nature due to their resource oriented limitations and to overcome this we need to authenticate and encrypt the messages sent among sensor network nodes in a network scalable environment. In the past decade many asymmetric algorithms have been proposed such as Diffie-Hellman and public key based schemes but they are not suitable for wireless sensor networks as we are implementing Symmetric key based schemes and in this paper we propose three new mechanisms for key establishment using a framework that is based on the pre-distribution of random set of keys to each node or a node pair. Firstly in the n-composite keys scheme we remove the predicting large-scale network attacks in order to significantly strengthen random key pre-distribution against small-scale attacks then secondly we propose reinforcement scheme in a multipath environment to strengthen the security between any two nodes by leveraging the security of other links and lastly we propose the random pair wise keys scheme which perfectly preserves the secrecy of the rest of the network when any node is captured by providing node-to-node authentication.
2017 IEEE Trustcom/BigDataSE/ICESS, 2017
6LoWPAN networks involving wireless sensors consist of resource starving miniature sensor nodes. Since secured authentication of these resource-constrained sensors is one of the important considerations during communication, use of asymmetric key distribution scheme may not be the perfect choice to achieve secure authentication. Recent research shows that Lucky Thirteen attack has compromised Datagram Transport Layer Security (DTLS) with Cipher Block Chaining (CBC) mode for key establishment. Even though EAKES6Lo and S3K techniques for key establishment follow the symmetric key establishment method, they strongly rely on a remote server and trust anchor for secure key distribution. Our proposed Lightweight Authentication Protocol (LAUP) used a symmetric key method with no preshared keys and comprised of four flights to establish authentication and session key distribution between sensors and Edge Router in a 6LoWPAN environment. Each flight uses freshly derived keys from existing information such as PAN ID (Personal Area Network IDentification) and device identities. We formally verified our scheme using the Scyther security protocol verification tool for authentication properties such as Aliveness, Secrecy, Non-Injective Agreement and Non-Injective Synchronization. We simulated and evaluated the proposed LAUP protocol using COOJA simulator with ContikiOS and achieved less computational time and low power consumption compared to existing authentication protocols such as the EAKES6Lo and SAKES.
CLEI Electronic Journal, 2011
TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks (WSNs). A number of researchers claim that cryptographic mechanisms demand plenty of resources from sensors. In this context, an important issue is to develop lightweight encryption mechanisms capable of running in resource-constrained sensors. The main contribution of this work is to carry out an experimental evaluation of a secure key distribution and storage scheme in a WSN using simulation and practical experiments. Through simulation, we verify that this scheme introduces very low processing overhead, in the order of nanoseconds, when compared to existing approaches. Additionally, practical measurements indicate that the scheme can be deployed by off-the-shelf sensor platforms, such as MicaZ and TelosB. The performance metrics considered are the processing time of encryption and decryption functions, the application memory requirements and the power consumption. We have also eva...
International Journal of Electrical and Computer Engineering (IJECE), 2017
Internet of things (IoT) has described a futurevision of internetwhere users, computing system, and everyday objects possessing sensing and actuating capabilities are part of distributed applications and required to support standard internet communication with more powerful device or internet hosts. This vision necessitates the security mechanisms for end-to-end communication. A key management protocol is critical to ensuring the secure exchange of data between interconnecting entities, but due to the nature of this communication system where a high resource constrained node may be communicating with node with high energy makes the application of existing key management protocols impossible. In this paper, we propose a new lightweight key management protocol that allows the constrained node in 6loWPAN network to transmit captured data to internet host in secure channel. This protocol is based on cooperation of selected 6loWPAN routers to participate in computation of highly consuming cryptographic primitives. Our protocol is assessed with AVISPA tool, the results show that our scheme ensured security properties. Keyword: 6LoWPAN network Internet of things Key management protocol 6LoWPAN routers AVISPA tool 1. INTRODUCTION The internet of things has made a revolution in the world of communication by connected the physical objects to Internet. According to [1] (IoT) is a concept and a paradigm that considers pervasive presence in the environment of a variety of things/objects that through wireless and wired connections and unique addressing schemes are able to interact with each other and cooperate with other things/objects to create new applications/services. The internet of things (IoT) describes the next generation of Internet, where the physical things or objects are connected, accessed and identified through the Internet, many technologies are involved in IoT, such as WSN (Wireless Sensors network) [2], intelligent sensing, Radio Frequency Identification (RFID) [3], 6LoWPAN [4], Near Field communications (NFC) [5] [6], low energy wireless communication , cloud computing, and so on. These technologies will interact with physical phenomena by employing more constrained sensing platforms and low-energy wireless communications, therefore, end-to-end communication between constrained sensing devices and other Internet host will be a fundamental requirement of many sensing application using these technologies, this aspects that seriously complicate the design and adoption of appropriate security mechanisms especially end-to-end security mechanisms.
COMPUTERS ELECTRICAL ENGINEERING, 2011
If a Wireless Sensor Network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as Public Key Cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN.
Jornada Research Institute Fall 2023 Newsletter, 2023
The discovery of possibly 20,000 years old footprints at White Sands, recent research by many Jornada Research Associations, and the new dating for artifacts and rock imagery of the Jornada (Miller 2018) are changing the paradigm for the Jornada. This new research can fuel how we look at some older theories about rock imagery. One of those paradigms is the origin of the kachinas. Kirkland (1940), Schaafsma (1980) and Sutherland (1976) all suggested that the Jornada was one of the places that the kachinas originated. Their theory is strengthened by the new dates and discoveries. Documenting and taking a new look at some of the details concerning possible kachina imagery is an important part of new rock art documentation. Let’s look at one early example and use modern technology for an update.
Adri Hermawan, 2015
HaMizrah HaHadash The New East, 2023
Arqueología de la construcción I: los procesos constructivos en el mundo romano: Italia y provincias occidentales, 2008
Estudos contemporâneos da linguagem: desafios e possibilidades, 2022
Artificial Intelligence and Law, 2020
Chemistry of Materials, 1996
Journal of Physical Chemistry A, 2021
Journal of Technological Prototypes, 2020
MPRA Paper, 2010
Molecular Immunology, 1998
Journal of Consulting and Clinical Psychology, 1984
Pustaka Kesehatan, 2014
The Journal of Infectious Diseases, 2009