Sensor Systems and Software. 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers

Research Article

Definition and Development of a Cryptographic Scheme for Wireless Sensor Networks

Download
462 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04166-7_4,
        author={Stefano Marchesani and Luigi Pomante and Marco Pugliese and Fortunato Santucci},
        title={Definition and Development of a  Cryptographic Scheme for Wireless Sensor Networks},
        proceedings={Sensor Systems and Software. 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers},
        proceedings_a={S-CUBE},
        year={2014},
        month={6},
        keywords={WSN security cryptographic scheme hybrid cryptography topology authenticated key},
        doi={10.1007/978-3-319-04166-7_4}
    }
    
  • Stefano Marchesani
    Luigi Pomante
    Marco Pugliese
    Fortunato Santucci
    Year: 2014
    Definition and Development of a Cryptographic Scheme for Wireless Sensor Networks
    S-CUBE
    Springer
    DOI: 10.1007/978-3-319-04166-7_4
Stefano Marchesani1,*, Luigi Pomante1,*, Marco Pugliese1,*, Fortunato Santucci1,*
  • 1: Università degli Studi dell’Aquila
*Contact email: stefano.marchesani@univaq.it, luigi.pomante@univaq.it, marco.pugliese@ieee.org, fortunato.santucci@univaq.it

Abstract

A Wireless Sensor Network (WSN) is a versatile and distributed sensing system that is able to support a wide variety of application domains. One of the most important issue in WSN design is to guarantee the reliability of the collected data which involves in turn security issues across wireless links. This paper deals with the cryptographic aspects in the broader field of security in WSNs. In particular, moving from some previous advances in our research activity, this manuscript proposes a novel cryptographic scheme that is compliant to security requirements that may arise from real-world WSN applications and reports some details about an implementation in that we have carried for experimental validation. The proposed scheme, called , exploits benefits from to handle resource constraints and allows to generate to provide increased robustness to the scheme itself.