Cryptography for (partially) compromised sensor networks
Authors | |
---|---|
Year of publication | 2011 |
Type | Article in Proceedings |
Conference | Information Security Summit - Crisis Plans and Security |
MU Faculty or unit | |
Citation | |
Field | Informatics |
Keywords | wireless sensor networks; cryptographic smart cards |
Description | This paper will introduce the technology of wireless sensor networks with a special focus on its security issues. This relatively young technology started to evolve together with the advance in miniaturization of electronic devices, decreasing costs and general spread of wireless communication. Data sensed by the miniature devices in a target area (e.g., temperature, pressure, movement) are locally processed and then transmitted to end user who obtains the possibility to continuously monitor target environment. The usage of the technology starts from medical monitoring of the patients over agriculture and industrial monitoring or early warning emergency systems, ending with uses for military purposes as well – that is where the technology originally started. We will cover the issue of design of a key distribution and establishment protocols secure against the partial network compromise in more details. Special focus will be given to possibility for its automated generation of protocols for particular network scenario. Opposite direction will be covered as well – automated search for attacker's. We will also cover possibility to introduce low-cost tamper resistant hardware to sensor nodes without increasing the node cost and battery consumption significantly – the scenario usually not assumed in current research papers in the field. |
Related projects: |