Secure random number generation in wireless sensor networks

被引:7
|
作者
Lo Re, Giuseppe [1 ]
Milazzo, Fabrizio [1 ]
Ortolani, Marco [1 ]
机构
[1] Univ Palermo, DICGIM, I-90128 Palermo, Italy
来源
关键词
true random numbers generator; network Security; wireless sensor networks; WORLD;
D O I
10.1002/cpe.3311
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverse applications, ranging from environmental monitoring to home automation, has raised more and more attention to the issues related to the design of specifically customized security mechanisms. The scarcity of computational, storage, and bandwidth resources cannot definitely be disregarded in such context, and this makes the implementation of security algorithms particularly challenging. This paper proposes a security framework for the generation of true random numbers, which are paramount as the core building block for many security algorithms; the intrinsic nature of wireless sensor nodes and their capability of reliably providing measurements of environmental quantities make them natural candidates as true random number generators. In order to provide robustness to common attacks, we additionally devised a protocol aimed at obscuring the actual source of data, by making nodes cooperate with their neighbors. Furthermore, we describe an enhanced version of our framework consisting in an optimization for use in the context of resource-constrained systems. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:3842 / 3862
页数:21
相关论文
共 50 条
  • [41] Setting Up Secure Wireless Sensor Networks
    Cionca, Victor
    Newe, Thomas
    Dadarlat, Vasile
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 335 - +
  • [42] Secure Key Distribution in Wireless Sensor Networks
    Umadevi, K. S.
    Ghosh, Arijit
    Menon, Anurag
    Nanaware, Mandar
    ADVANCED SCIENCE LETTERS, 2018, 24 (08) : 6013 - 6016
  • [43] Towards survivable and secure wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 442 - +
  • [44] Secure and resilient localization in wireless sensor networks
    Ning, Peng
    Liu, Donggang
    Du, Wenliang
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 161 - +
  • [45] Coordination middleware for secure wireless sensor networks
    Nakamura, Yuichi
    Louvel, Maxime
    Nishi, Hiroaki
    PROCEEDINGS OF THE IECON 2016 - 42ND ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2016, : 6931 - 6936
  • [46] An Efficient Secure scheme for Wireless Sensor Networks
    Elleuchi, Manel
    Cheikhrouhou, Omar
    Obeid, Abdulfattah M.
    Abid, Mohamed
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 128 - 131
  • [47] A Secure Routing Algorithm in Wireless Sensor Networks
    Hu, Zhi
    Wen, Ying-you
    Zhao, Hong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 793 - 796
  • [48] Aggregating Secure Data In Wireless Sensor Networks
    Parameswari, K.
    Raseen, M. Mohamed
    2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET), 2013, : 381 - 383
  • [49] Secure median computation in wireless sensor networks
    Roy, Sankardas
    Conti, Mauro
    Setia, Sanjeev
    Jajodia, Sushil
    AD HOC NETWORKS, 2009, 7 (08) : 1448 - 1462
  • [50] A Secure Routing Protocol for Wireless Sensor Networks
    Sen, Jaydip
    Ukil, Arijit
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 : 277 - 290