As sensor networks edge closer towards wide-spread deployment,
security issues become a central concern. So far, the main research
focus has been on making sensor networks feasible and useful, and
less emphasis was placed on security.
We design a suite of security building blocks that are optimized
for resource-constrained environments and wireless communica-
tion. SPINS has two secure building blocks: SNEP and
?
TESLA.
SNEP provides the following important baseline security primi-
tives: Data con?dentiality, two-party data authentication, and data
freshness. A particularly hard problem is to provide ef?cient broad-
cast authentication, which is an important mechanism for sensor
networks.
?
TESLA is a new protocol which provides authenticated
broadcast for severely resource-constrained environments. We im
-
plemented the above protocols, and show that they are practical
even on minimalistic hardware: The performance of the protocol
suite easily matches the data rate of our network. Additionally, we
demonstrate that the suite can be used for building higher level pro-
tocols.
As sensor networks edge closer towards wide-spread deployment,security issues become a central concern. So far, the main researchfocus has been on making sensor networks feasible and useful, andless emphasis was placed on security.We design a suite of security building blocks that are optimizedfor resource-constrained environments and wireless communica-tion. SPINS has two secure building blocks: SNEP and?TESLA.SNEP provides the following important baseline security primi-tives: Data con?dentiality, two-party data authentication, and datafreshness. A particularly hard problem is to provide ef?cient broad-cast authentication, which is an important mechanism for sensornetworks.?TESLA is a new protocol which provides authenticatedbroadcast for severely resource-constrained environments. We im-plemented the above protocols, and show that they are practicaleven on minimalistic hardware: The performance of the protocolsuite easily matches the data rate of our network. Additionally, wedemonstrate that the suite can be used for building higher level pro-tocols.
การแปล กรุณารอสักครู่..
