Home > Research > Publications & Outputs > On The Feasibility of a New Defense Layer for W...

Electronic data

  • n2s09chung.pdf

    Accepted author manuscript, 349 KB, PDF document

    Available under license: None

Links

View graph of relations

On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging. / Chung, Antony; Roedig, Utz.
International Conference on Network and Service Security, 2009. N2S '09. . IEEE, 2009. p. 1-6.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Chung, A & Roedig, U 2009, On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging. in International Conference on Network and Service Security, 2009. N2S '09. . IEEE, pp. 1-6, IFIP Network and Security Conference (N2S) 2009, Paris, France, 1/01/00. <http://ieeexplore.ieee.org/document/5161665/?tp=&arnumber=5161665>

APA

Vancouver

Chung A, Roedig U. On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging. In International Conference on Network and Service Security, 2009. N2S '09. . IEEE. 2009. p. 1-6

Author

Chung, Antony ; Roedig, Utz. / On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging. International Conference on Network and Service Security, 2009. N2S '09. . IEEE, 2009. pp. 1-6

Bibtex

@inproceedings{dbeccaab73204e6c8273d78b22e884c2,
title = "On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging",
abstract = "Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.",
author = "Antony Chung and Utz Roedig",
year = "2009",
month = jun,
language = "English",
isbn = "9782953244311",
pages = "1--6",
booktitle = "International Conference on Network and Service Security, 2009. N2S '09.",
publisher = "IEEE",
note = "IFIP Network and Security Conference (N2S) 2009 ; Conference date: 01-01-1900",

}

RIS

TY - GEN

T1 - On The Feasibility of a New Defense Layer for Wireless Sensor Networks using RF Ranging

AU - Chung, Antony

AU - Roedig, Utz

PY - 2009/6

Y1 - 2009/6

N2 - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.

AB - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.

M3 - Conference contribution/Paper

SN - 9782953244311

SP - 1

EP - 6

BT - International Conference on Network and Service Security, 2009. N2S '09.

PB - IEEE

T2 - IFIP Network and Security Conference (N2S) 2009

Y2 - 1 January 1900

ER -