SPINS

Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and µTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.


References in zbMATH (referenced in 41 articles , 1 standard article )

Showing results 1 to 20 of 41.
Sorted by year (citations)

1 2 3 next

  1. Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun: A dynamic prime number based efficient security mechanism for big sensing data streams (2017)
  2. Das, Ayan Kumar; Chaki, Rituparna; Dey, Kashi Nath: Secure energy efficient routing protocol for wireless sensor network (2016) ioport
  3. Hazra, Prasun; Giri, Debasis; Das, Ashok Kumar: Key chain-based key predistribution protocols for securing wireless sensor networks (2015)
  4. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  5. Gong, Zheng; Hartel, Pieter; Nikova, Svetla; Tang, Shao-Hua; Zhu, Bo: TuLP: a family of lightweight message authentication codes for body sensor networks (2014) ioport
  6. Kibangou, Alain Y.: Step-size sequence design for finite-time average consensus in secure wireless sensor networks (2014)
  7. Chan, Aldar C.-F.: On optimal cryptographic key derivation (2013)
  8. Huang, Jen-Yan; Liao, I-En; Chung, Yu-Fang; Chen, Kuen-Tzung: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining (2013) ioport
  9. Shi, Xi; Xiao, Di: A reversible watermarking authentication scheme for wireless sensor networks (2013) ioport
  10. Bagaa, Miloud; Challal, Yacine; Ouadjaout, Abdelraouf; Lasla, Noureddine; Badache, Nadjib: Efficient data aggregation with in-network integrity control for WSN (2012) ioport
  11. Bicakci, Kemal; Bagci, Ibrahim Ethem; Tavli, Bulent: Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures (2012) ioport
  12. Lee, Jaeheung; Kim, Seokhyun; Cho, Yookun; Chung, Yoojin; Park, Yongsu: HORSIC: an efficient one-time signature scheme for wireless sensor networks (2012)
  13. Deng, Xiao-Ming; Xiong, Yan: A new protocol for the detection of node replication attacks in mobile wireless sensor networks (2011)
  14. Di Pietro, Roberto; Soriente, Claudio; Spognardi, Angelo; Tsudik, Gene: Intrusion-resilient integrity in data-centric unattended WSNs (2011) ioport
  15. Yu, Haifeng: Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (2011)
  16. Anjum, Farooq: Location dependent key management in sensor networks without using deployment knowledge (2010) ioport
  17. Dini, Gianluca; Savino, Ida Maria: A security architecture for reconfigurable networked embedded systems (2010) ioport
  18. Guerrero-Zapata, Manel; Zilan, Ruken; Barceló-Ordinas, José M.; Bicakci, Kemal; Tavli, Bulent: The future of security in wireless multimedia sensor networks. A position paper (2010) ioport
  19. Liu, Donggang: Efficient and distributed access control for sensor networks (2010) ioport
  20. Nagy, Naya; Nagy, Marius; Akl, Selim G.: Quantum security in wireless sensor networks (2010)

1 2 3 next