Efficient Key Generation and Distributionon Wireless Sensor Networks
Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil moni...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
KTH, Kommunikationsnät
2013
|
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493 |
id |
ndltd-UPSALLA1-oai-DiVA.org-kth-141493 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-kth-1414932014-02-19T04:45:01ZEfficient Key Generation and Distributionon Wireless Sensor NetworksengArino Perez, VictorKTH, Kommunikationsnät2013Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil monitoring, mining, battle eld operations, as well as consumerproducts. Hence, practical security solutions for the intercommunication must be provided,ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes arenot tamper-proof and have very limited available resources and capabilities which makes PKIcurrently not attractive for this environment. At the same time, key pre-distribution providetoo low security for most applications. Therefore, the communication bootstrapping or thekey generation and distribution problem is an important concern to be addressed with theadditional di culty of the constrained capabilities of WSN nodes. In this thesis, a solution tothis problem is described. It makes use of ECDH and the curve K-163 for key exchange, AESCCM-128 for symmetric encryption to lower the processing overhead and a partial challengesolving chain as well as a TAS to provide strong authentication. Several hash functions havebeen analysed as well as several random number generating approaches. At the same time, inorder to t the key generation and distribution algorithms together with the regular sensoroperation, code optimizations were carried out on the cryptographic library Relic-Toolkit,reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run usingonly 18KB of ash; and the peripheral drivers developed for the CC430 reduced as well thecomputation time. The solution allows to generate and distribute the keys in situ and isproved to be resilient to most adversaries while taking into account scalability, portability,energy consumption and making it suitable for consumer applications. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493EES Examensarbete / Master Thesisapplication/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
description |
Wireless Sensor Networks have become popular during the last years. The introduction ofIPv6 which broadened the address space available, IEEE802.15.4 and adaption layers such as6loWPAN have allowed the intercommunication of small devices. These networks are usefulin many scenarios such as civil monitoring, mining, battle eld operations, as well as consumerproducts. Hence, practical security solutions for the intercommunication must be provided,ensuring privacy, authenticity, integrity and data freshness. In most cases, WSN nodes arenot tamper-proof and have very limited available resources and capabilities which makes PKIcurrently not attractive for this environment. At the same time, key pre-distribution providetoo low security for most applications. Therefore, the communication bootstrapping or thekey generation and distribution problem is an important concern to be addressed with theadditional di culty of the constrained capabilities of WSN nodes. In this thesis, a solution tothis problem is described. It makes use of ECDH and the curve K-163 for key exchange, AESCCM-128 for symmetric encryption to lower the processing overhead and a partial challengesolving chain as well as a TAS to provide strong authentication. Several hash functions havebeen analysed as well as several random number generating approaches. At the same time, inorder to t the key generation and distribution algorithms together with the regular sensoroperation, code optimizations were carried out on the cryptographic library Relic-Toolkit,reducing the memory footprint in 4KB; code reductions on Contiki OS allowed it to run usingonly 18KB of ash; and the peripheral drivers developed for the CC430 reduced as well thecomputation time. The solution allows to generate and distribute the keys in situ and isproved to be resilient to most adversaries while taking into account scalability, portability,energy consumption and making it suitable for consumer applications. |
author |
Arino Perez, Victor |
spellingShingle |
Arino Perez, Victor Efficient Key Generation and Distributionon Wireless Sensor Networks |
author_facet |
Arino Perez, Victor |
author_sort |
Arino Perez, Victor |
title |
Efficient Key Generation and Distributionon Wireless Sensor Networks |
title_short |
Efficient Key Generation and Distributionon Wireless Sensor Networks |
title_full |
Efficient Key Generation and Distributionon Wireless Sensor Networks |
title_fullStr |
Efficient Key Generation and Distributionon Wireless Sensor Networks |
title_full_unstemmed |
Efficient Key Generation and Distributionon Wireless Sensor Networks |
title_sort |
efficient key generation and distributionon wireless sensor networks |
publisher |
KTH, Kommunikationsnät |
publishDate |
2013 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-141493 |
work_keys_str_mv |
AT arinoperezvictor efficientkeygenerationanddistributiononwirelesssensornetworks |
_version_ |
1716647695405285376 |