Abstract
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. Those devices offer different services and use services provided by other sensor nodes. To give sensor nodes the possibility to offer services and to network-wide search for available services, some kind of lookup facility is needed. Several possibilities exist to realize service lookup in traditional networks and ad-hoc networks [ALM03, GOL99, GUT99, PRE02, SAL99, ZHU03]. In this paper we present Secure Content Addressable Networks Version 2 (SCANv2), a secure overlay focusing especially on wireless sensor networks. The paper describes how this secure overlay can be used among other things to offer lookup functionality in sensor networks. The design of the overlay focuses on secure service lookups. The overlay is part of the Karlsruhe Sensor Network Platform K-SNeP, a modular and flexible architecture for service centric sensor networks. Key areas of application of the architecture are gradually extendable service centric sensor networks where sensors and actuators jointly perform various user defined tasks, e.g. in the field of an office environment or health care.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Almenárez, F., Campo, C.: SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks. In: 9th Open European Summer School and I-FIP Workshop on Next Generation Networks, Budapest, Ungarn (2003)
Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), Xerox Palo Alto Research Center, Palo Alto, USA (2002)
http://www.emule-project.net/ (accessed on, 09.03.2004)
http://www.greatduckisland.net/ (accessed on 09.03.2004)
Goland, Y., Cai, T., Leach, P., Gu, Y., Albright, S.: Simple service discovery Protocol/1.0 operationg without an arbiter. Internet Draft, IETF (1999)
Guttman, E., Perkins, C., Veizades, J., Day, M.: Service Location Protocol, Version 2. IETF RFC2608 (1999)
Hof, H.-J., Blaß, E.-O., Furhmann, T., Zitterbart, M.: Design of a Secure Distributed Service Directory for Wireless Sensornetworks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 276–290. Springer, Heidelberg (2004)
Koblitz, N.: A course in number theory and cryptography, 2nd edn. Springer, Berlin (1994)
Maxime: Java-Powered Cryptographic iButton (2004), http://www.ibutton.com/ibuttons/java.html (accessed on, 09.03.2004)
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 53. Springer, Heidelberg (2002)
Mazières, D., Kaminsky, M., Kaashoek, M.F., Witchel, E.: Separating key management from file system security. In: 17th Symposium on Operating Systems Principles (SOSP 1999), Kiawah Island (1999)
Preuß, S.: JESA Service Discovery Protocol: Efficient Service Discovery in Ad-Hoc Networks. In: 2nd International IFIP-TC6 Networking Conference, Pisa, Italien (2002)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of ACM SIGCOMM 2001 (August 2001)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
The Salutation Consortium: Salutation Architecture Specification Version 2.0c (1999), http://www.salutation.org/spec/Sa20e1a21.pdf
Stajano, F.: Security for ubiquitous computing. John Wiley & Sons, West Sussex (2002)
Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Technical Report TR-819, Massachusetts Institute of Technology, Cambridge, USA (March 2001)
Zhao, B.Y., Kubiatowicz, K.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing, Technical Report UCB//CSD-01-1141, Computer Science Division, U. C. Berkeley, Berkeley, USA (April 2001)
Zhu, F., Mutka, M., Ni, L.: Splendor: A secure, private and location-aware service discovery protocol supporting mobile services. In: 1st IEEE International Conference on Pervasive Computing and Communications (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hof, HJ., Blaß, EO., Zitterbart, M. (2005). Secure Overlay for Service Centric Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)