Secure random number generation in wireless sensor networks

被引:7
|
作者
Lo Re, Giuseppe [1 ]
Milazzo, Fabrizio [1 ]
Ortolani, Marco [1 ]
机构
[1] Univ Palermo, DICGIM, I-90128 Palermo, Italy
来源
关键词
true random numbers generator; network Security; wireless sensor networks; WORLD;
D O I
10.1002/cpe.3311
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor nodes and their capability of reliably providing measurements of environmental quantities make them natural candidates as true random number generators. In order to provide robustness to common attacks, we additionally devised a protocol aimed at obscuring the actual source of data, by making nodes cooperate with their neighbors. Furthermore, we describe an enhanced version of our framework consisting in an optimization for use in the context of resource-constrained systems. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:3842 / 3862
页数:21
相关论文
共 50 条
  • [41] A Secure Routing Algorithm in Wireless Sensor Networks
    Hu, Zhi
    Wen, Ying-you
    Zhao, Hong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 793 - 796
  • [42] Coordination middleware for secure wireless sensor networks
    Nakamura, Yuichi
    Louvel, Maxime
    Nishi, Hiroaki
    PROCEEDINGS OF THE IECON 2016 - 42ND ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2016, : 6931 - 6936
  • [43] Secure median computation in wireless sensor networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    AD HOC NETWORKS, 2009, 7 (08) : 1448 - 1462
  • [44] Aggregating Secure Data In Wireless Sensor Networks
    Parameswari, K.
    Raseen, M. Mohamed
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 381 - 383
  • [45] A Secure Routing Protocol for Wireless Sensor Networks
    Sen, Jaydip
    Ukil, Arijit
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 : 277 - 290
  • [46] Towards survivable and secure wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 442 - +
  • [47] Secure Key Distribution in Wireless Sensor Networks
    Umadevi, K. S.
    Ghosh, Arijit
    Menon, Anurag
    Nanaware, Mandar
    ADVANCED SCIENCE LETTERS, 2018, 24 (08) : 6013 - 6016
  • [48] Forward secure communication in wireless sensor networks
    Mauw, Sjouke
    van Vessem, Ivo
    Bos, Bert
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 32 - 42
  • [49] Secure group communication in wireless sensor networks
    Ghosh, Subhas K.
    Patro, Ranjeet K.
    Raina, Manik
    Thejaswi, Chandrasekhara
    Ganapathy, Viswanath
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 525 - +
  • [50] Setting Up Secure Wireless Sensor Networks
    Cionca, Victor
    Newe, Thomas
    Dadarlat, Vasile
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 335 - +