Accepted author manuscript, 349 KB, PDF document
Available under license: None
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging
AU - Chung, Antony
AU - Roedig, Utz
PY - 2009/6
Y1 - 2009/6
N2 - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.
AB - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.
M3 - Conference contribution/Paper
SN - 9782953244311
SP - 1
EP - 6
BT - International Conference on Network and Service Security, 2009. N2S '09.
PB - IEEE
T2 - IFIP Network and Security Conference (N2S) 2009
Y2 - 1 January 1900
ER -