[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Enhancing Sensor Network Security with RSL Codes

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking
  • 1367 Accesses

Abstract

Sensor networks have found their wide applications in a variety of areas such as ocean and wildlife monitoring, manufacturing machinery, performance monitoring, building safety and earthquake monitoring. How to protect the data confidentiality is a challenging problem for sensor networks because of their resource constraints such as data memory, code space and energy to power the sensor nodes. Different threats to sensor networks, compared to those happened to traditional ad-hoc networks, also bring unique requirements to the design of a secure sensor network. In this paper, we present a novel encryption scheme based on Reed-Solomon-Like (RSL) Codes. The scheme provides a solution to the secure sensor networks with the advantages of fast calculation, low power consumption and easy implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar, “Spins: Security protocols for sensor networks”, Wireless Networks, vol. 8, pp.521, 2002.

    Article  MATH  Google Scholar 

  2. Ball Semiconductor Inc., “Medical Applications”, Benefits of Spherical Geometry, 1997.

    Google Scholar 

  3. J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Mobile networking for smart dust”, ACM/IEEE Intl. Conf. on Mobile Computing and Networking, Seattle, WA, August 1999, Mobicom 99.

    Google Scholar 

  4. Yordan Kostov and Govind Rao, “Low cost optical instrumentation for biomedical measurement”, J. Review of Scientific Instruments, 2000.

    Google Scholar 

  5. Weimerskirch and D. Westhoff, “Zero-Common Knowledge Authentication for Pervasive Networks”, Proc. 10th Workshop Selected Areas in Cryptography (SAC ‘03), pp. 73, July 2003.

    Google Scholar 

  6. Weimerskirch and D. Westhoff, “Identity Certified Zero- Common Knowledge Authentication”, Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’03), Oct. 2003.

    Google Scholar 

  7. Weimerskirch, D. Westhoff, S. Lucks, and E. Zenner, “Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis”, Sensor Network Operations, S. Phoha, T.F. La Porta, and C. Griffin, eds. Wiley-IEEE Press, May 20

    Google Scholar 

  8. G.L.Feng, R.H.Deng, F.Bao and J.C.Shen, “New Efficient MDS Array Codes for RAID Part I: Reed-Solomn-Like Codes for Tolerating Three Disk Failures”, IEEE Transactions on Computer, vol. 54, no. 8, Sep. 2006.

    Google Scholar 

  9. F.J. MacWilliams and N.J. A. Sloane, The Theory of Error-Correcting Codes, Elsevier Science Publishers B.V. 1977.

    Google Scholar 

  10. Shafi Goldwasser and Silvio Micali, “Probabilistic Encryption”, Journal of Computer Security, vol. 28, 1984.

    Google Scholar 

  11. Neil Gross, “21 ideas for the 21st century”, Business Week, pp. 78¨C167, Aug. 30, 1999.

    Google Scholar 

  12. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks”, Communications of ACM, vol. 47, No.6, 2004.

    Google Scholar 

  13. G. Gaubatz, J.P. Kaps, and B. Sunar. “Public key cryptography in sensor networks – revisited”, In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004.

    Google Scholar 

  14. N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. “Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs”. In 2004 workshop on Cryptographic Hardware and Embedded Systems, August 2004.

    Google Scholar 

  15. D. J. Malan, M. Welsh, and M. D. Smith. “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography”, First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON’04.

    Google Scholar 

  16. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and et. Al., “Tinypk: securing sensor networks with public key technology”, Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN’04), pages 59–64, New York, NY, USA, 2004. ACM Press.

    Google Scholar 

  17. Y. Law, J. Doumen, and P. Hartel. “Survey and benchmark of block ciphers for wireless sensor networks”, Technical Report TR-CTIT-04–07, Centre for Telematics and Information Technology, University of Twente, The Netherlands, 2004.

    Google Scholar 

  18. P.Ganesan, R.Venugopalan and et.al., “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes”, Proceedings of Wireless Sensor Networks and Applications, WSNA’03, San Diego, CA, 2003.

    Google Scholar 

  19. D.W.Carman and P.S. Krus and B.J. Matt, “Constraints and Approaches for Distributed Sensor Network Security”, Technical Report, NAI Labs, Security Research Division, Glenwood, MD, 2000.

    Google Scholar 

  20. J. Hill, R. Szewczyk, A. Woo,D. Culler and K. Pister, “System architecture directions for networked sensors”, Proceedings of ACM, ASPLOS IX, November 2000.

    Google Scholar 

  21. G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks, John Wiley and Sons, 2005.

    Google Scholar 

  22. W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Chapter 18, Prentice Hall, 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Chunyan Bai or Guiliang Feng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Bai, C., Feng, G. (2010). Enhancing Sensor Network Security with RSL Codes. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_76

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_76

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics