Skip to main content

Secure Overlay for Service Centric Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3313))

Abstract

Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided by other sensor nodes. To give sensor nodes the possibility to offer services and to network-wide search for available services, some kind of lookup facility is needed. Several possibilities exist to realize service lookup in traditional networks and ad-hoc networks [ALM03, GOL99, GUT99, PRE02, SAL99, ZHU03]. In this paper we present Secure Content Addressable Networks Version 2 (SCANv2), a secure overlay focusing especially on wireless sensor networks. The paper describes how this secure overlay can be used among other things to offer lookup functionality in sensor networks. The design of the overlay focuses on secure service lookups. The overlay is part of the Karlsruhe Sensor Network Platform K-SNeP, a modular and flexible architecture for service centric sensor networks. Key areas of application of the architecture are gradually extendable service centric sensor networks where sensors and actuators jointly perform various user defined tasks, e.g. in the field of an office environment or health care.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Almenárez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and I-FIP Workshop on Next Generation Networks, Budapest, Ungarn (2003)

    Google Scholar 

  2. Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), Xerox Palo Alto Research Center, Palo Alto, USA (2002)

    Google Scholar 

  3. http://www.emule-project.net/ (accessed on, 09.03.2004)

  4. http://www.greatduckisland.net/ (accessed on 09.03.2004)

  5. Goland, Y., Cai, T., Leach, P., Gu, Y., Albright, S.: Simple service discovery Protocol/1.0 operationg without an arbiter. Internet Draft, IETF (1999)

    Google Scholar 

  6. Guttman, E., Perkins, C., Veizades, J., Day, M.: Service Location Protocol, Version 2. IETF RFC2608 (1999)

    Google Scholar 

  7. Hof, H.-J., Blaß, E.-O., Furhmann, T., Zitterbart, M.: Design of a Secure Distributed Service Directory for Wireless Sensornetworks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 276–290. Springer, Heidelberg (2004)

    Google Scholar 

  8. Koblitz, N.: A course in number theory and cryptography, 2nd edn. Springer, Berlin (1994)

    Google Scholar 

  9. Maxime: Java-Powered Cryptographic iButton (2004), http://www.ibutton.com/ibuttons/java.html (accessed on, 09.03.2004)

  10. Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 53. Springer, Heidelberg (2002)

    Google Scholar 

  11. Mazières, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: 17th Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island (1999)

    Google Scholar 

  12. Preuß, S.: JESA Service Discovery Protocol: Efficient Service Discovery in Ad-Hoc Networks. In: 2nd International IFIP-TC6 Networking Conference, Pisa, Italien (2002)

    Google Scholar 

  13. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of ACM SIGCOMM 2001 (August 2001)

    Google Scholar 

  14. Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)

    Google Scholar 

  15. The Salutation Consortium: Salutation Architecture Specification Version 2.0c (1999), http://www.salutation.org/spec/Sa20e1a21.pdf

  16. Stajano, F.: Security for ubiquitous computing. John Wiley & Sons, West Sussex (2002)

    Google Scholar 

  17. Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Technical Report TR-819, Massachusetts Institute of Technology, Cambridge, USA (March 2001)

    Google Scholar 

  18. Zhao, B.Y., Kubiatowicz, K.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing, Technical Report UCB//CSD-01-1141, Computer Science Division, U. C. Berkeley, Berkeley, USA (April 2001)

    Google Scholar 

  19. Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private and location-aware service discovery protocol supporting mobile services. In: 1st IEEE International Conference on Pervasive Computing and Communications (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hof, HJ., Blaß, EO., Zitterbart, M. (2005). Secure Overlay for Service Centric Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30496-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24396-0

  • Online ISBN: 978-3-540-30496-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics