2009
DOI: 10.1007/978-3-642-05284-2_13
|View full text |Cite
|
Sign up to set email alerts
|

Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks

Abstract: Abstract. We consider the classical problem of establishing initial security associations in wireless sensor networks. More specifically, we focus on pre-deployment phase in which sensor nodes have not yet been loaded with shared secrets or other forms of authentic information.In this paper, we propose two novel multichannel protocols for initialization of large scale wireless sensor networks. The first protocol uses only secret key cryptography and is suitable for CPU-constrained sensor nodes. The second prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 31 publications
(60 reference statements)
0
5
0
Order By: Relevance
“…Their algorithm, however, required a human to interact with one of the devices to complete the protocol. Similar LED-based approaches are discussed in [Gauger et al 2009;Perković et al 2009;Roman and Lopez 2008] to perform key assignment in ad-hoc wireless sensors networks.…”
Section: Out-of-band Covert-light Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Their algorithm, however, required a human to interact with one of the devices to complete the protocol. Similar LED-based approaches are discussed in [Gauger et al 2009;Perković et al 2009;Roman and Lopez 2008] to perform key assignment in ad-hoc wireless sensors networks.…”
Section: Out-of-band Covert-light Channelsmentioning
confidence: 99%
“…This too is a form of "security through obscurity" as any entity monitoring the light intensity in the room would be able to detect that "covert" communication is taking place. Additionally, in [Gauger et al 2009;Perković et al 2009], the researchers made the assumption that no adversary had access to the light-based communication channel. This assumption is not valid in our model, but one that is perhaps valid in the context of initial key assignment and shows that more research is required to determine ways in which light communication can be used to meet the security requirements of out-of-band covert communications.…”
Section: Covertness and Defencementioning
confidence: 99%
“…The main motivation to use I ‐codes for transmission of public messages rather than using approaches in which users verify public messages communicated via VLC is to design a solution that minimizes participation by non‐specialist users.…”
Section: Public Key Based Deployment Solutionmentioning
confidence: 99%
“…In Human‐Assisted Pure Audio Device Pairing (HAPADEP) , both data and verification information are sent over an audio channel, and thus, the pairing devices have to be equipped with speakers and microphones. Saxena and Udin in and Saxena et al in and Perkovic et al in present device pairing methods based on device equipped with LEDs and a video camera as the receiver. In , Perkovic et al propose a solution that allows an unaided user to initialize a relatively large number of wireless devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation