Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks

  • Authors:
  • Barry Doyle;Stuart Bell;Alan F. Smeaton;Kealan Mccusker;Noel E. O'Connor

  • Affiliations:
  • School of Computing, Dublin City University Glasnevin, Dublin 9, Ireland;School of Computing, Dublin City University Glasnevin, Dublin 9, Ireland;Adaptive Information Cluster and Centre for Digital Video Processing, Dublin City University Glasnevin, Dublin 9, Ireland;Adaptive Information Cluster and Centre for Digital Video Processing, Dublin City University Glasnevin, Dublin 9, Ireland;Adaptive Information Cluster and Centre for Digital Video Processing, Dublin City University Glasnevin, Dublin 9, Ireland

  • Venue:
  • The Computer Journal
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Sensor networks are becoming increasingly important for a wide variety of applications including environmental monitoring, building safety and emergency relief services. A typical sensor network consists of a large number of small, low-power, low-cost nodes that form a self-organized network using wireless peer-to-peer communication. Because sensor networks pose unique constraints on their operation, traditional security techniques used by conventional networks cannot be applied. In this paper we consider the operational issues and security threats to sensor networks. We discuss the state of the art in terms of sensor network security and we examine the practicality of using efficient elliptic curve algorithms and identity based encryption to deploy a secure sensor network infrastructure. We evaluate the potential for realizing this on low-power, long-life devices by measuring power consumption of the operations needed for key management in a sensor network and thus provide further evidencefor the feasibility of the approach.