Abstract
Constraint specific wireless sensor networks need energy efficient and secure communication mechanisms. In this paper we propose Lightweight Security protocol (LSec) that fulfils both requirements. LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme. It also provides confidentiality of data and protection mechanism against intrusions and anomalies. LSec is memory efficient that requires 72 bytes of memory storage for keys. It only introduces 74.125 bytes of transmission and reception cost per connection.
This work is financially supported by the Ministry of Education and Human Resources Development (MOE), the Ministry of Commerce, Industry and Energy (MOCIE) and the Ministry of Labor (MOLAB) through the fostering project of the Lab of Excellency. The corresponding author of this paper is Prof. Sungyoung Lee.
Chapter PDF
Similar content being viewed by others
References
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc. of the First IEEE International Workshop on Sensor Network Protocols and Applications (WSNA 2003), May 2003, pp. 113–127 (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of INFOCOM (March 2004) 2004
L. Ray.: Active Security Mechanisms for Wireless Sensor Networks and Energy optimization for passive security Routing, PhD Dissertation, Dep. of Computer Science, Louisiana State University (August 2005)
Kohl, J., Clifford Neuman, B.: The Kerberos Network Authentication Service (v5)., RFC 1510 (September 1993)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transaction on Information Theory 22, 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining Digital Signatures and Public key cryptosystem. Communication of ACM 21(2), 120–126 (1978)
Erik-Oliver,B., Martina, E.: Towards Acceptable Public-Key Encryption in Sensor Networks. In: Proc. of 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS (May 2005)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A Survey., Technical Report MIST-TR-2005-007 (July 2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. of 7th annual international conference on Mobile computing and networking, Rome, Italy, August 2001, pp. 188–189 (2001)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proc. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, November 2004, pp. 162–175 (2004)
Jones, K., Wadaa, A., Oladu, S., Wlson, L., Etoweissy, M.: Towards a new paradigm for securing wireless sensor networks. In: Proc. of the 2003 workshop on New security paradigms, Ascona, Switzerland, August 2003, pp. 115–121 (2003)
Park, T., Shin, K.G.: LiSP: A Lightweight Security Protocol for Wireless Sensor Networks. ACM Transactions on Embedded Computing Systems 3(3), 634–660 (2004)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM conference on Computer and communications security, Washington, USA, pp. 62–72 (2003)
Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications, 38–43 (December 2004)
Sensor Network Simulator and Emulator (SENSE), http://www.cs.rpi.edu/~cheng3/sense/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shaikh, R.A., Lee, S., Khan, M.A.U., Song, Y.J. (2006). LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. In: Cuenca, P., Orozco-Barbosa, L. (eds) Personal Wireless Communications. PWC 2006. Lecture Notes in Computer Science, vol 4217. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11872153_32
Download citation
DOI: https://doi.org/10.1007/11872153_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45174-7
Online ISBN: 978-3-540-45176-1
eBook Packages: Computer ScienceComputer Science (R0)