TY - GEN
T1 - Tiny 3-TLS
T2 - 3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006
AU - Fouladgar, Sepideh
AU - Mainaud, Bastien
AU - Masmoudi, Khaled
AU - Afifi, Hossam
PY - 2006/12/1
Y1 - 2006/12/1
N2 - Adapting security protocols to wireless sensor networks architectures is a challenging research field because of their specific constraints. Actually, sensors are computationally weak devices, unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie-Hellman). In this paper, we introduce Tiny 3-TLS, an extension and adaptation of TLS handshake sub-protocol that allows establishing secure communications between sensing nodes and remote monitoring terminals. Our protocol aims at guaranteeing the integrity and confidentiality of communications between sensors and distant terminals, after having established mutual authentication between the two parties. In order to achieve these security goals without putting too much burden on sensing devices, Tiny 3-TLS rely on an intermediate node, the sink node. Depending on the trustworthiness of this sink node and on the applications, we propose two versions of our proposition. Besides, we provide a formal validation of the protocol's security goals achievement and an evaluation of its computation and delay performances.
AB - Adapting security protocols to wireless sensor networks architectures is a challenging research field because of their specific constraints. Actually, sensors are computationally weak devices, unable to perform heavy cryptographic operations like classical asymmetric algorithms (RSA, Diffie-Hellman). In this paper, we introduce Tiny 3-TLS, an extension and adaptation of TLS handshake sub-protocol that allows establishing secure communications between sensing nodes and remote monitoring terminals. Our protocol aims at guaranteeing the integrity and confidentiality of communications between sensors and distant terminals, after having established mutual authentication between the two parties. In order to achieve these security goals without putting too much burden on sensing devices, Tiny 3-TLS rely on an intermediate node, the sink node. Depending on the trustworthiness of this sink node and on the applications, we propose two versions of our proposition. Besides, we provide a formal validation of the protocol's security goals achievement and an evaluation of its computation and delay performances.
UR - https://www.scopus.com/pages/publications/77952637624
U2 - 10.1007/11964254_5
DO - 10.1007/11964254_5
M3 - Conference contribution
AN - SCOPUS:77952637624
SN - 9783540691723
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 32
EP - 42
BT - Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Revised Selected Papers
Y2 - 20 September 2006 through 21 September 2006
ER -