Secure random number generation in wireless sensor networks

被引:7
|
作者
Lo Re, Giuseppe [1 ]
Milazzo, Fabrizio [1 ]
Ortolani, Marco [1 ]
机构
[1] Univ Palermo, DICGIM, I-90128 Palermo, Italy
来源
关键词
true random numbers generator; network Security; wireless sensor networks; WORLD;
D O I
10.1002/cpe.3311
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor nodes and their capability of reliably providing measurements of environmental quantities make them natural candidates as true random number generators. In order to provide robustness to common attacks, we additionally devised a protocol aimed at obscuring the actual source of data, by making nodes cooperate with their neighbors. Furthermore, we describe an enhanced version of our framework consisting in an optimization for use in the context of resource-constrained systems. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:3842 / 3862
页数:21
相关论文
共 50 条
  • [21] Simple Secure Protocol for Wireless Sensor Networks
    Manjuprasad, B.
    Dharani, Andhe
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 260 - 263
  • [22] Secure Data Aggregation in Wireless Sensor Networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 1040 - 1052
  • [23] Deterministic secure positioning in wireless sensor networks
    Delaet, Sylvie
    Mandal, Partha Sarathi
    Rokicki, Mariusz A.
    Tixeuil, Sebastien
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (35) : 4471 - 4481
  • [24] Secure multiple deployment in wireless sensor networks
    Li, Guorui
    He, Jingsha
    Fu, Yingfang
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 389 - +
  • [25] Deterministic secure positioning in wireless sensor networks
    Delaet, Sylvie
    Mandal, Partha Sarathi
    Rokicki, Mariusz A.
    Tixeuil, Sebastien
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, 2008, 5067 : 469 - +
  • [26] Secure Data Aggregation in Wireless Sensor Networks
    Vaidehi, V.
    Kayalvizhi, R.
    Sekar, N. Chandra
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2179 - 2184
  • [27] Secure broadcast protocol for wireless sensor networks
    School of Mechanical and Precision Instrument Engineering, Xi’an University of Technology, Weiguo Road, Chang’an District, Xi’an, China
    不详
    不详
    不详
    NSW, Australia
    ICIC Express Lett Part B Appl., 1 (61-66):
  • [28] Designing Secure Protocols for Wireless Sensor Networks
    Uluagac, A. Selcuk
    Lee, Christopher P.
    Beyah, Raheem A.
    Copeland, John A.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 503 - +
  • [29] Secure localization algorithms for wireless sensor networks
    Boukerche, Azzedine
    Oliveira, Horacio A. B. F.
    Nakamura, Eduardo F.
    Loureiro, Antonio A. F.
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 96 - 101
  • [30] A Survey of Secure Routing in Wireless Sensor Networks
    LI ZhiyuanWANG RuchuanCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing ChinaState Key Laboratory for Novel Software TechnologyNanjing UniversityNanjing China
    南京邮电大学学报(自然科学版), 2010, 30 (01) : 77 - 87