The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Cryptography for Developers
MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Mobile Networks and Applications
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
The energy cost of SSL in deeply embedded systems
The energy cost of SSL in deeply embedded systems
Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)
ICN '10 Proceedings of the 2010 Ninth International Conference on Networks
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
Realization of Mobile Femtocells: Operational and Protocol Requirements
Wireless Personal Communications: An International Journal
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wireless Sensor Nodes are powered by limited batteries and equipped with constrained processor and memory. Therefore, security protocol must be highly efficient to fit WSNs. Meanwhile, considering the large variety of WSN applications and wide deployment, scalability and interoperability are two important concerns of adopting standardized communication protocols. HIP DEX, an IETF Internet draft, provides a generic solution to establish secure connections in WSNs. In this paper, we investigate the security features of HIP DEX based on several practical attack models. We evaluate the performance efficiency of HIP DEX in terms of energy consumption and computing latency on an experimental prototype. Our empirical results show that HIP DEX is applicable for resource constrained sensor nodes to establish hop-by-hop secure connection. In order to reinforce identity protection, we also propose tentative improvements to HIP DEX. Finally, we compare HIP DEX with SSL/TLS to highlight their respective advantages in different WSN architectures.