Abstract
Sensor networks have found their wide applications in a variety of areas such as ocean and wildlife monitoring, manufacturing machinery, performance monitoring, building safety and earthquake monitoring. How to protect the data confidentiality is a challenging problem for sensor networks because of their resource constraints such as data memory, code space and energy to power the sensor nodes. Different threats to sensor networks, compared to those happened to traditional ad-hoc networks, also bring unique requirements to the design of a secure sensor network. In this paper, we present a novel encryption scheme based on Reed-Solomon-Like (RSL) Codes. The scheme provides a solution to the secure sensor networks with the advantages of fast calculation, low power consumption and easy implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D.Tygar, “Spins: Security protocols for sensor networks”, Wireless Networks, vol. 8, pp.521, 2002.
Ball Semiconductor Inc., “Medical Applications”, Benefits of Spherical Geometry, 1997.
J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Mobile networking for smart dust”, ACM/IEEE Intl. Conf. on Mobile Computing and Networking, Seattle, WA, August 1999, Mobicom 99.
Yordan Kostov and Govind Rao, “Low cost optical instrumentation for biomedical measurement”, J. Review of Scientific Instruments, 2000.
Weimerskirch and D. Westhoff, “Zero-Common Knowledge Authentication for Pervasive Networks”, Proc. 10th Workshop Selected Areas in Cryptography (SAC ‘03), pp. 73, July 2003.
Weimerskirch and D. Westhoff, “Identity Certified Zero- Common Knowledge Authentication”, Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’03), Oct. 2003.
Weimerskirch, D. Westhoff, S. Lucks, and E. Zenner, “Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis”, Sensor Network Operations, S. Phoha, T.F. La Porta, and C. Griffin, eds. Wiley-IEEE Press, May 20
G.L.Feng, R.H.Deng, F.Bao and J.C.Shen, “New Efficient MDS Array Codes for RAID Part I: Reed-Solomn-Like Codes for Tolerating Three Disk Failures”, IEEE Transactions on Computer, vol. 54, no. 8, Sep. 2006.
F.J. MacWilliams and N.J. A. Sloane, The Theory of Error-Correcting Codes, Elsevier Science Publishers B.V. 1977.
Shafi Goldwasser and Silvio Micali, “Probabilistic Encryption”, Journal of Computer Security, vol. 28, 1984.
Neil Gross, “21 ideas for the 21st century”, Business Week, pp. 78¨C167, Aug. 30, 1999.
Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks”, Communications of ACM, vol. 47, No.6, 2004.
G. Gaubatz, J.P. Kaps, and B. Sunar. “Public key cryptography in sensor networks – revisited”, In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004.
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. “Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs”. In 2004 workshop on Cryptographic Hardware and Embedded Systems, August 2004.
D. J. Malan, M. Welsh, and M. D. Smith. “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography”, First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON’04.
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and et. Al., “Tinypk: securing sensor networks with public key technology”, Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN’04), pages 59–64, New York, NY, USA, 2004. ACM Press.
Y. Law, J. Doumen, and P. Hartel. “Survey and benchmark of block ciphers for wireless sensor networks”, Technical Report TR-CTIT-04–07, Centre for Telematics and Information Technology, University of Twente, The Netherlands, 2004.
P.Ganesan, R.Venugopalan and et.al., “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes”, Proceedings of Wireless Sensor Networks and Applications, WSNA’03, San Diego, CA, 2003.
D.W.Carman and P.S. Krus and B.J. Matt, “Constraints and Approaches for Distributed Sensor Network Security”, Technical Report, NAI Labs, Security Research Division, Glenwood, MD, 2000.
J. Hill, R. Szewczyk, A. Woo,D. Culler and K. Pister, “System architecture directions for networked sensors”, Proceedings of ACM, ASPLOS IX, November 2000.
G. Kabatiansky, E. Krouk, S. Semenov, Error Correcting Coding and Security for Data Networks, John Wiley and Sons, 2005.
W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Chapter 18, Prentice Hall, 2006.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Bai, C., Feng, G. (2010). Enhancing Sensor Network Security with RSL Codes. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_76
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_76
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)