TY - CHAP
T1 - On the feasibility of a new defense layer for wireless sensor networks using RF ranging
AU - Chung, Tony
AU - Roedig, Utz
PY - 2009
Y1 - 2009
N2 - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.
AB - Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management benefits. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a defined radius are rejected without requiring keys. We provide our motivation, an evaluation of our findings and continuing research challenges. We find RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.
UR - https://www.scopus.com/pages/publications/70449635715
M3 - Chapter
AN - SCOPUS:70449635715
SN - 9782953244311
T3 - 2009 International Conference on Network and Service Security, N2S 2009
BT - 2009 International Conference on Network and Service Security, N2S 2009
T2 - 2009 International Conference on Network and Service Security, N2S 2009
Y2 - 24 June 2009 through 26 June 2009
ER -