4th International ICST Conference on Wireless Internet

Research Article

EAP-Sens: A Security Architecture For Wireless Sensor Networks

Download602 downloads
  • @INPROCEEDINGS{10.4108/ICST.WICON2008.4827,
        author={M. Abdul Alim and Behcet Sarikaya},
        title={EAP-Sens: A Security Architecture For Wireless Sensor Networks},
        proceedings={4th International ICST Conference on Wireless Internet},
        publisher={ICST},
        proceedings_a={WICON},
        year={2010},
        month={5},
        keywords={Wireless Sensor Network Security EAP WPAN GPSK},
        doi={10.4108/ICST.WICON2008.4827}
    }
    
  • M. Abdul Alim
    Behcet Sarikaya
    Year: 2010
    EAP-Sens: A Security Architecture For Wireless Sensor Networks
    WICON
    ICST
    DOI: 10.4108/ICST.WICON2008.4827
M. Abdul Alim1,*, Behcet Sarikaya2,*
  • 1: The Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge, United Kingdom CB3 0FD
  • 2: Computer Science and Operations Research, University of Montreal, Montreal, Quebec Canada H3C 3J7
*Contact email: Abdul.Alim@cl.cam.ac.uk, sarikaya@iro.umontreal.ca

Abstract

We present the design, implementation and simulation of a security protocol based on Extensible Authentication Proto- col nick-named EAP-Sens for wireless sensor networks. We use the generalized pre-shared key authentication method for authentication and key establishment. Standard EAP model is used for authenticating sensor nodes within the ra- dio range of the authenticator. For distant nodes, we use Relay Authenticators to tunnel EAP messages to the au- thenticator. We have defined EAP message encapsulations for IEEE 802.15.4 standard and a key hierarchy for EAP- Sens. To analyze EAP-Sens performance on larger config- urations a simulation model has been developed. We have implemented an EAP-Sens prototype for Tmote sensors and showed that EAP based security protocol is feasible in wire- less sensor networks.