By Topic

Secure-TWS: Authenticating node to multi-user communication in shared sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)

Recent works have shown the usefulness of network and application layer protocols that connect low power sensor nodes directly to multiple applications and users on the Internet. We propose a security solution for this scenario. While previous works have provided security support for various communication patterns in sensor networks, such as among nodes, from nodes to a base station, and from users to nodes, the security of communication from sensor nodes to multiple users has not been sufficiently addressed. Specifically, we explore this design space and develop a security solution, named Secure-TWS, for efficient authentication of data sent by a resource constrained sensor node to multiple users, using digital signatures. We investigate the resource overheads in communication and computation for two most suitable signature schemes - the elliptic curve digital algorithm (ECDSA) and the Boneh-Lynn-Shacham (BLS) short signature schemes. We implement these schemes on two popular sensor node architectures (based on MSP430 and ARM processors with 802.15.4 radios) and experimentally characterize relevant trade-offs.

Published in:

Information Processing in Sensor Networks, 2009. IPSN 2009. International Conference on

Date of Conference:

13-16 April 2009