Publication | Closed Access
TinySec
1.6K
Citations
35
References
2004
Year
Unknown Venue
Hardware SecurityEngineeringWireless SecuritySecure RoutingSecurity GuaranteesMobile ComputingInternet Of ThingsLightweight ProtocolSweet SpotLink Layer ProtocolsSecure ProtocolData SecurityCryptography
Wireless sensor networks face severe resource constraints that make conventional security protocols, which add 16–32 bytes of overhead, impractical, as lessons from 802.11b and GSM vulnerabilities highlight the need for lighter solutions. The authors introduce TinySec, the first fully‑implemented link‑layer security architecture for wireless sensor networks. TinySec achieves lightweight security by selecting cryptographic primitives that balance security, packet overhead, and resource use, and is portable across diverse hardware and radio platforms. Experiments on a 36‑node network show that TinySec adds less than 10 % energy, latency, and bandwidth overhead, proving software link‑layer security is feasible and efficient.
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols tend to be conservative in their security guarantees, typically adding 16--32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
| Year | Citations | |
|---|---|---|
Page 1
Page 1