ASWN/23/Security Protocols for Sensor Networks (SPINS), Sensor Network Encryption Protocol (SNEP)
CLICK Here https://www.youtube.com/channel/UC-s9vNBHUJP3SEofXwrXccQ/?sub_confirmation=1 Security Protocols for Sensor Networks (SPINS) Sensor Network Encryption Protocol (SNEP) Micro-version of Timed Efficient Stream Loss- Tolerant Authentication protocol (μTESLA) Reliability Requirements in Sensor Networks Security Protocols for Sensor Networks (SPINS) Security protocols for sensor networks (SPINS) consists of a suite of security protocols that are optimized for highly resource-constrained sensor networks. SPINS consists of two main modules: • Sensor Network Encryption Protocol (SNEP) • Micro-version of Timed Efficient Stream Loss-Tolerant Authentication protocol (μTESLA) Sensor Network Encryption Protocol (SNEP) Key Generation /Setup Authentication, Confidentiality Strong Freshness Counter exchange protocol Micro Timed Efficient Stream Loss-tolerant Authentication (µTESLA) Micro Timed Efficient Stream Loss-tolerant Authentication delivers broadcast authentication. The pure TESLA is not practical for a node to broadcast authenticated data. Problems with TESLA Digital Signature for initial packet authentication µTESLA uses only symmetric mechanism Overhead of 24 bytes per packet µTESLA discloses key once per epoch One way key chain is too big µTESLA restricts number of authenticated senders Authentication To send an authenticated packet, the base station simply computes a MAC on the packet with a key that is secret at that point in time. When a node gets a packet, it can verify that the corresponding MAC key was not yet disclosed by the base. Since a receiving node is assured that the MAC key is known only by the base station, the receiving node is assured that no adversary could have altered the packet in transit. Key Setup µTESLA Detailed Description Reliability Requirements in Sensor Networks
Download
0 formatsNo download links available.