Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and µTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

References in zbMATH (referenced in 49 articles , 1 standard article )

Showing results 1 to 20 of 49.
Sorted by year (citations)

1 2 3 next

  1. Luo, Yuling; Liu, Yunqi; Liu, Junxiu; Ouyang, Xue; Cao, Yi; Ding, Xuemei: ECM-IBS: a Chebyshev map-based broadcast authentication for wireless sensor networks (2019)
  2. Zhao, R.; Qin, G. H.; Chen, H. P.; Qin, J.; Yan, J.: Security-aware scheduling for flexray-based real-time automotive systems (2019)
  3. Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun: A dynamic prime number based efficient security mechanism for big sensing data streams (2017)
  4. Das, Ayan Kumar; Chaki, Rituparna; Dey, Kashi Nath: Secure energy efficient routing protocol for wireless sensor network (2016) ioport
  5. Hazra, Prasun; Giri, Debasis; Das, Ashok Kumar: Key chain-based key predistribution protocols for securing wireless sensor networks (2015)
  6. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  7. Gong, Zheng; Hartel, Pieter; Nikova, Svetla; Tang, Shao-Hua; Zhu, Bo: TuLP: a family of lightweight message authentication codes for body sensor networks (2014) ioport
  8. Kibangou, Alain Y.: Step-size sequence design for finite-time average consensus in secure wireless sensor networks (2014)
  9. Chan, Aldar C.-F.: On optimal cryptographic key derivation (2013)
  10. Huang, Jen-Yan; Liao, I-En; Chung, Yu-Fang; Chen, Kuen-Tzung: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining (2013) ioport
  11. Shi, Xi; Xiao, Di: A reversible watermarking authentication scheme for wireless sensor networks (2013) ioport
  12. Bagaa, Miloud; Challal, Yacine; Ouadjaout, Abdelraouf; Lasla, Noureddine; Badache, Nadjib: Efficient data aggregation with in-network integrity control for WSN (2012) ioport
  13. Bicakci, Kemal; Bagci, Ibrahim Ethem; Tavli, Bulent: Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures (2012) ioport
  14. He, Xiaobing; Szalachowski, Pawel; Kotulski, Zbigniew; Fotiou, Nikos; Marias, Giannis F.; Polyzos, George C.; de Meer, Hermann: Energy-aware key management in mobile wireless sensor networks (2012) ioport
  15. Lee, Jaeheung; Kim, Seokhyun; Cho, Yookun; Chung, Yoojin; Park, Yongsu: HORSIC: an efficient one-time signature scheme for wireless sensor networks (2012)
  16. Deng, Xiao-Ming; Xiong, Yan: A new protocol for the detection of node replication attacks in mobile wireless sensor networks (2011)
  17. Di Pietro, Roberto; Soriente, Claudio; Spognardi, Angelo; Tsudik, Gene: Intrusion-resilient integrity in data-centric unattended WSNs (2011) ioport
  18. Yu, Haifeng: Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (2011)
  19. Anjum, Farooq: Location dependent key management in sensor networks without using deployment knowledge (2010) ioport
  20. Dini, Gianluca; Savino, Ida Maria: A security architecture for reconfigurable networked embedded systems (2010) ioport

1 2 3 next