By Topic

An approach to designing lightweight security protocol on binary CDMA sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jae Hoon Roh ; Exploration Department, Central R&D Laboratory, KT Corporation, Seoul, Korea ; Mi-Yeon Kim ; Ho Kun Moon

Wireless sensor network characteristics contain limited power to store, ability to withstand harsh environmental conditions, ability to cope with node failures, mobility of nodes, dynamic network topology, heterogeneity of nodes, communication failures and large scale of deployment. The traditional cryptographic protocol models are not suitable in low power sensor nodes due to inherent resource and computing constraints. Data traffic encryption heavily impacts to system performance on real-time processing. To provide security functionalities without decreasing network performance in the wireless sensor networks, a lightweight cryptographic protocol applicable to wireless sensor networks is needed. This paper presents the security functionalities of Binary CDMA technology which can be used to wireless personal area network, and classifies many of attack types, then defines the security requirements for binary CDMA sensor networks. With the security requirements, we design efficient cryptographic protocol corresponding to defensive countermeasures from adversaries. Our cryptographic protocol model has been designed to be practical use by utilizing binary CDMA security code in sensor networks.

Published in:

2009 International Conference on Ultra Modern Telecommunications & Workshops

Date of Conference:

12-14 Oct. 2009