by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar
Abstract:
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and mTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. mTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.
Reference:
SPINS: Security Protocols for Sensor Networks. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar. In Journal of Wireless Networks 8 (5) 2002.
Bibtex Entry:
@Article{PSWCT2002,
author = {Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar},
title = {{SPINS}: Security Protocols for Sensor Networks},
url = {/publications/papers/spins-wine-journal.pdf},
journal = {Journal of Wireless Networks},
year = 2002,
volume = 8,
number = 5,
pages = {521--534},
month = Sep,
abstract = {Wireless sensor networks will be widely deployed in
the near future. While much research has focused on
making these networks feasible and useful, security
has received little attention. We present a suite of
security protocols optimized for sensor networks:
SPINS. SPINS has two secure building blocks: SNEP
and mTESLA. SNEP includes: data confidentiality,
two-party data authentication, and evidence of data
freshness. mTESLA provides authenticated broadcast
for severely resource-constrained environments. We
implemented the above protocols, and show that they
are practical even on minimal hardware: the
performance of the protocol suite easily matches the
data rate of our network. Additionally, we
demonstrate that the suite can be used for building
higher level protocols.}
}