Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and µTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. µTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

References in zbMATH (referenced in 50 articles , 1 standard article )

Showing results 1 to 20 of 50.
Sorted by year (citations)

1 2 3 next

  1. Luo, Yuling; Liu, Yunqi; Liu, Junxiu; Ouyang, Xue; Cao, Yi; Ding, Xuemei: ECM-IBS: a Chebyshev map-based broadcast authentication for wireless sensor networks (2019)
  2. Zhao, R.; Qin, G. H.; Chen, H. P.; Qin, J.; Yan, J.: Security-aware scheduling for flexray-based real-time automotive systems (2019)
  3. Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun: A dynamic prime number based efficient security mechanism for big sensing data streams (2017)
  4. Das, Ayan Kumar; Chaki, Rituparna; Dey, Kashi Nath: Secure energy efficient routing protocol for wireless sensor network (2016) ioport
  5. Hazra, Prasun; Giri, Debasis; Das, Ashok Kumar: Key chain-based key predistribution protocols for securing wireless sensor networks (2015)
  6. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  7. Gong, Zheng; Hartel, Pieter; Nikova, Svetla; Tang, Shao-Hua; Zhu, Bo: TuLP: a family of lightweight message authentication codes for body sensor networks (2014) ioport
  8. Kibangou, Alain Y.: Step-size sequence design for finite-time average consensus in secure wireless sensor networks (2014)
  9. Chan, Aldar C.-F.: On optimal cryptographic key derivation (2013)
  10. Cirani, Simone; Ferrari, Gianluigi; Veltri, Luca: Enforcing security mechanisms in the IP-based Internet of things: an algorithmic overview (2013)
  11. Huang, Jen-Yan; Liao, I-En; Chung, Yu-Fang; Chen, Kuen-Tzung: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining (2013) ioport
  12. Shi, Xi; Xiao, Di: A reversible watermarking authentication scheme for wireless sensor networks (2013) ioport
  13. Bagaa, Miloud; Challal, Yacine; Ouadjaout, Abdelraouf; Lasla, Noureddine; Badache, Nadjib: Efficient data aggregation with in-network integrity control for WSN (2012) ioport
  14. Bicakci, Kemal; Bagci, Ibrahim Ethem; Tavli, Bulent: Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures (2012) ioport
  15. He, Xiaobing; Szalachowski, Pawel; Kotulski, Zbigniew; Fotiou, Nikos; Marias, Giannis F.; Polyzos, George C.; de Meer, Hermann: Energy-aware key management in mobile wireless sensor networks (2012) ioport
  16. Lee, Jaeheung; Kim, Seokhyun; Cho, Yookun; Chung, Yoojin; Park, Yongsu: HORSIC: an efficient one-time signature scheme for wireless sensor networks (2012)
  17. Deng, Xiao-Ming; Xiong, Yan: A new protocol for the detection of node replication attacks in mobile wireless sensor networks (2011)
  18. Di Pietro, Roberto; Soriente, Claudio; Spognardi, Angelo; Tsudik, Gene: Intrusion-resilient integrity in data-centric unattended WSNs (2011) ioport
  19. Yu, Haifeng: Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (2011)
  20. Anjum, Farooq: Location dependent key management in sensor networks without using deployment knowledge (2010) ioport

1 2 3 next