Our Publications

by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar
Abstract:
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and mTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. mTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.
Reference:
SPINS: Security Protocols for Sensor Networks. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar. In Journal of Wireless Networks 8 (5) 2002.
Bibtex Entry:
@Article{PSWCT2002,
    author =       {Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar},
    title =        {{SPINS}: Security Protocols for Sensor Networks},
    url = {/publications/papers/spins-wine-journal.pdf},
    journal =      {Journal of Wireless Networks},
    year =         2002,
    volume =       8,
    number =       5,
    pages =        {521--534},
    month =        Sep,
    abstract =     {Wireless sensor networks will be widely deployed in
                  the near future. While much research has focused on
                  making these networks feasible and useful, security
                  has received little attention. We present a suite of
                  security protocols optimized for sensor networks:
                  SPINS. SPINS has two secure building blocks: SNEP
                  and mTESLA. SNEP includes: data confidentiality,
                  two-party data authentication, and evidence of data
                  freshness. mTESLA provides authenticated broadcast
                  for severely resource-constrained environments. We
                  implemented the above protocols, and show that they
                  are practical even on minimal hardware: the
                  performance of the protocol suite easily matches the
                  data rate of our network. Additionally, we
                  demonstrate that the suite can be used for building
                  higher level protocols.}
}