Skip to main content

Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks

  • Conference paper
Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4357))

Included in the following conference series:

Abstract

Adapting security protocols to wireless sensor networks architectures is a challenging research field because of their specific constraints. Actually, sensors are computationally weak devices, unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie-Hellman). In this paper, we introduce Tiny 3-TLS, an extension and adaptation of TLS handshake sub-protocol that allows establishing secure communications between sensing nodes and remote monitoring terminals. Our protocol aims at guaranteeing the integrity and confidentiality of communications between sensors and distant terminals, after having established mutual authentication between the two parties. In order to achieve these security goals without putting too much burden on sensing devices, Tiny 3-TLS rely on an intermediate node, the sink node. Depending on the trustworthiness of this sink node and on the applications, we propose two versions of our proposition. Besides, we provide a formal validation of the protocol’s security goals achievement and an evaluation of its computation and delay performances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Avrora project homepage, http://compilers.cs.ucla.edu/avrora/

  2. The AVISPA project homepage, http://www.avispa-project.org/

  3. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (October 2004)

    Google Scholar 

  4. Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet. In: Third IEEE International Conference on Pervasive Computing and Communications (March 2005)

    Google Scholar 

  5. Masmoudi, K., Hussein, M., Afifi, H., Seret, D.: Tri-party TLS Adaptation for Trust Delegation in Home Networks. In: IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks (September 2005)

    Google Scholar 

  6. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol - Version 1.1. IETF RFC 4346 (April 2006)

    Google Scholar 

  7. Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  8. Miller, V.: Uses of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  9. Chevalier, Y., et al.: A High-Level Protocol Specification Language for Industrial Security-Sensitive Protocols, www.avispa-project.org

  10. Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)

    Google Scholar 

  11. Basin, D., Modersheim, S., Viganno, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)

    Google Scholar 

  12. Lamport, L.: The temporal logic of actions. ACM Transactions on Programming Languages and Systems 16(3), 872–923 (1994)

    Article  Google Scholar 

  13. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003 (May 2003), ISBN 0-7381-3677-5

    Google Scholar 

  14. IST MAGNET-Beyond project homepage, http://www.ist-magnet.org

  15. IEEE Std. 802.1X-2004, Standards for Local and Metropolitan Area Networks: Port Based Network Acces Control

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fouladgar, S., Mainaud, B., Masmoudi, K., Afifi, H. (2006). Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_5

Download citation

  • DOI: https://doi.org/10.1007/11964254_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69172-3

  • Online ISBN: 978-3-540-69173-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics