SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Integrating wireless EEGs into medical sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Ayushman: a wireless sensor network based health monitoring infrastructure and testbed
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
A security architecture for mobile wireless sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Hi-index | 0.00 |
We present the design, implementation and simulation of a security protocol based on Extensible Authentication Protocol nick-named EAP-Sens for wireless sensor networks. We use the generalized pre-shared key authentication method for authentication and key establishment. Standard EAP model is used for authenticating sensor nodes within the radio range of the authenticator. For distant nodes, we use Relay Authenticators to tunnel EAP messages to the authenticator. We have defined EAP message encapsulations for IEEE 802.15.4 standard and a key hierarchy for EAP-Sens. To analyze EAP-Sens performance on larger configurations a simulation model has been developed. We have implemented an EAP-Sens prototype for Tmote sensors and showed that EAP based security protocol is feasible in wireless sensor networks.