Efficient Key Generation and Distributionon Wireless Sensor Networks

Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil moni...

Full description

Bibliographic Details
Main Author: Arino Perez, Victor
Format: Others
Language:English
Published: KTH, Kommunikationsnät 2013
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493
id ndltd-UPSALLA1-oai-DiVA.org-kth-141493
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-kth-1414932014-02-19T04:45:01ZEfficient Key Generation and Distributionon Wireless Sensor NetworksengArino Perez, VictorKTH, Kommunikationsnät2013Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil monitoring, mining, battle eld operations, as well as consumerproducts. Hence, practical security solutions for the intercommunication must be provided,ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes arenot tamper-proof and have very limited available resources and capabilities which makes PKIcurrently not attractive for this environment. At the same time, key pre-distribution providetoo low security for most applications. Therefore, the communication bootstrapping or thekey generation and distribution problem is an important concern to be addressed with theadditional di culty of the constrained capabilities of WSN nodes. In this thesis, a solution tothis problem is described. It makes use of ECDH and the curve K-163 for key exchange, AESCCM-128 for symmetric encryption to lower the processing overhead and a partial challengesolving chain as well as a TAS to provide strong authentication. Several hash functions havebeen analysed as well as several random number generating approaches. At the same time, inorder to t the key generation and distribution algorithms together with the regular sensoroperation, code optimizations were carried out on the cryptographic library Relic-Toolkit,reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run usingonly 18KB of ash; and the peripheral drivers developed for the CC430 reduced as well thecomputation time. The solution allows to generate and distribute the keys in situ and isproved to be resilient to most adversaries while taking into account scalability, portability,energy consumption and making it suitable for consumer applications. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493EES Examensarbete / Master Thesisapplication/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
description Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil monitoring, mining, battle eld operations, as well as consumerproducts. Hence, practical security solutions for the intercommunication must be provided,ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes arenot tamper-proof and have very limited available resources and capabilities which makes PKIcurrently not attractive for this environment. At the same time, key pre-distribution providetoo low security for most applications. Therefore, the communication bootstrapping or thekey generation and distribution problem is an important concern to be addressed with theadditional di culty of the constrained capabilities of WSN nodes. In this thesis, a solution tothis problem is described. It makes use of ECDH and the curve K-163 for key exchange, AESCCM-128 for symmetric encryption to lower the processing overhead and a partial challengesolving chain as well as a TAS to provide strong authentication. Several hash functions havebeen analysed as well as several random number generating approaches. At the same time, inorder to t the key generation and distribution algorithms together with the regular sensoroperation, code optimizations were carried out on the cryptographic library Relic-Toolkit,reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run usingonly 18KB of ash; and the peripheral drivers developed for the CC430 reduced as well thecomputation time. The solution allows to generate and distribute the keys in situ and isproved to be resilient to most adversaries while taking into account scalability, portability,energy consumption and making it suitable for consumer applications.
author Arino Perez, Victor
spellingShingle Arino Perez, Victor
Efficient Key Generation and Distributionon Wireless Sensor Networks
author_facet Arino Perez, Victor
author_sort Arino Perez, Victor
title Efficient Key Generation and Distributionon Wireless Sensor Networks
title_short Efficient Key Generation and Distributionon Wireless Sensor Networks
title_full Efficient Key Generation and Distributionon Wireless Sensor Networks
title_fullStr Efficient Key Generation and Distributionon Wireless Sensor Networks
title_full_unstemmed Efficient Key Generation and Distributionon Wireless Sensor Networks
title_sort efficient key generation and distributionon wireless sensor networks
publisher KTH, Kommunikationsnät
publishDate 2013
url http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493
work_keys_str_mv AT arinoperezvictor efficientkeygenerationanddistributiononwirelesssensornetworks
_version_ 1716647695405285376