Abstract | ||
---|---|---|
Wireless Sensor Nodes are powered by limited batteries and equipped with constrained processor and memory. Therefore, security protocol must be highly efficient to fit WSNs. Meanwhile, considering the large variety of WSN applications and wide deployment, scalability and interoperability are two important concerns of adopting standardized communication protocols. HIP DEX, an IETF Internet draft, provides a generic solution to establish secure connections in WSNs. In this paper, we investigate the security features of HIP DEX based on several practical attack models. We evaluate the performance efficiency of HIP DEX in terms of energy consumption and computing latency on an experimental prototype. Our empirical results show that HIP DEX is applicable for resource constrained sensor nodes to establish hop-by-hop secure connection. In order to reinforce identity protection, we also propose tentative improvements to HIP DEX. Finally, we compare HIP DEX with SSL/TLS to highlight their respective advantages in different WSN architectures. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1145/2069105.2069114 | Q2SWinet |
Keywords | Field | DocType |
wireless sensor nodes,security protocol,hop-by-hop secure connection,hip diet exchange,ietf internet draft,different wsn architecture,secure connection,hip dex,wsn security establishment,security feature,performance analysis,computing latency,wsn application,elliptic curve cryptography,wireless sensor network,wireless sensor networks,communication protocol | Key distribution in wireless sensor networks,Internet Draft,Cryptographic protocol,Interoperability,Computer network,Host Identity Protocol,Engineering,Wireless sensor network,Communications protocol,Scalability | Conference |
Citations | PageRank | References |
12 | 0.86 | 9 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Pin Nie | 1 | 25 | 2.87 |
Juho Vähä-Herttua | 2 | 12 | 0.86 |
Tuomas Aura | 3 | 552 | 77.28 |
Andrei Gurtov | 4 | 1326 | 109.52 |