Our Publications

by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar
Abstract:
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and mTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. mTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.
Reference:
SPINS: Security Protocols for Sensor Networks  [bibtex]Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar. In Journal of Wireless Networks volume 8(5) 2002.
Bibtex Entry:
@Article{PSWCT2002,
  author = 		 {Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar},
  title = 		 {{SPINS}: Security Protocols for Sensor Networks},
  url = {http://www.netsec.ethz.ch/publications/papers/spins-wine-journal.pdf},
  journal = 	 {Journal of Wireless Networks},
  year = 		 2002,
  volume =		 8,
  number =		 5,
  pages =		 {521--534},
  month =		 Sep,
  abstract =	 {Wireless sensor networks will be widely deployed in
                  the near future. While much research has focused on
                  making these networks feasible and useful, security
                  has received little attention. We present a suite of
                  security protocols optimized for sensor networks:
                  SPINS. SPINS has two secure building blocks: SNEP
                  and mTESLA. SNEP includes: data confidentiality,
                  two-party data authentication, and evidence of data
                  freshness. mTESLA provides authenticated broadcast
                  for severely resource-constrained environments. We
                  implemented the above protocols, and show that they
                  are practical even on minimal hardware: the
                  performance of the protocol suite easily matches the
                  data rate of our network. Additionally, we
                  demonstrate that the suite can be used for building
                  higher level protocols.}
}