Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and µTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

References in zbMATH (referenced in 41 articles , 1 standard article )

Showing results 1 to 20 of 41.
Sorted by year (citations)

1 2 3 next

  1. Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun: A dynamic prime number based efficient security mechanism for big sensing data streams (2017)
  2. Das, Ayan Kumar; Chaki, Rituparna; Dey, Kashi Nath: Secure energy efficient routing protocol for wireless sensor network (2016)
  3. Hazra, Prasun; Giri, Debasis; Das, Ashok Kumar: Key chain-based key predistribution protocols for securing wireless sensor networks (2015)
  4. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  5. Gong, Zheng; Hartel, Pieter; Nikova, Svetla; Tang, Shao-Hua; Zhu, Bo: TuLP: a family of lightweight message authentication codes for body sensor networks (2014)
  6. Kibangou, Alain Y.: Step-size sequence design for finite-time average consensus in secure wireless sensor networks (2014)
  7. Chan, Aldar C.-F.: On optimal cryptographic key derivation (2013)
  8. Huang, Jen-Yan; Liao, I-En; Chung, Yu-Fang; Chen, Kuen-Tzung: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining (2013)
  9. Shi, Xi; Xiao, Di: A reversible watermarking authentication scheme for wireless sensor networks (2013)
  10. Bagaa, Miloud; Challal, Yacine; Ouadjaout, Abdelraouf; Lasla, Noureddine; Badache, Nadjib: Efficient data aggregation with in-network integrity control for WSN (2012)
  11. Bicakci, Kemal; Bagci, Ibrahim Ethem; Tavli, Bulent: Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures (2012)
  12. Lee, Jaeheung; Kim, Seokhyun; Cho, Yookun; Chung, Yoojin; Park, Yongsu: HORSIC: an efficient one-time signature scheme for wireless sensor networks (2012)
  13. Deng, Xiao-Ming; Xiong, Yan: A new protocol for the detection of node replication attacks in mobile wireless sensor networks (2011)
  14. Di Pietro, Roberto; Soriente, Claudio; Spognardi, Angelo; Tsudik, Gene: Intrusion-resilient integrity in data-centric unattended WSNs (2011)
  15. Yu, Haifeng: Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (2011)
  16. Anjum, Farooq: Location dependent key management in sensor networks without using deployment knowledge (2010)
  17. Dini, Gianluca; Savino, Ida Maria: A security architecture for reconfigurable networked embedded systems (2010)
  18. Guerrero-Zapata, Manel; Zilan, Ruken; Barceló-Ordinas, José M.; Bicakci, Kemal; Tavli, Bulent: The future of security in wireless multimedia sensor networks. A position paper (2010)
  19. Liu, Donggang: Efficient and distributed access control for sensor networks (2010)
  20. Nagy, Naya; Nagy, Marius; Akl, Selim G.: Quantum security in wireless sensor networks (2010)

1 2 3 next