The Internet of Things is imposing an evolution of the capabilities of wireless sensor networks. The new IP-based 6LoWPAN standard for low power sensor networks allows an almost seamless connection of local sensor networks to the Internet. On the other hand, the connection to the Internet also opens doors for unauthorized nodes to become part of the local network. The most important challenge in preventing this, is the implementation of a key management architecture, keeping in mind that the sensor nodes are constrained in power consumption and data storage capacity. This paper builds on a previously proposed symmetric key management scheme for 6LoWPAN networks presented by Smeets et al.in [1]. The original scheme is based on wired bootstrapping for the enrollment of new nodes, while the paper at hand proposes a wireless method. We analyze the original wired scheme and propose an improved wireless scheme, elaborating on the practical implementation on Zolertia Z1 nodes running Contiki-OS. We show that it is possible to provide end-to-end security using wireless bootstrapping within the constraints of the tiny nodes at hand.
Smeets, R, Mentens, N, Aerts, K, Singelee, D, Braeken, A, Carlier, M, Segers, L, Steenhaut, K & Touhafi, A 2014, Efficient Key Pre-distribution for 6LoWPAN. in L Batten, G Li, W Niu & M Warren (eds), Applications and Techniques in Information Security. Communications in Computer and Information Science, vol. 490, Springer, pp. 256-263, International Conference on Applications and Techniques in Information Security, Melbourne, Australia, 26/11/14. <http://link.springer.com/chapter/10.1007%2F978-3-662-45670-5_24>
Smeets, R., Mentens, N., Aerts, K., Singelee, D., Braeken, A., Carlier, M., Segers, L., Steenhaut, K., & Touhafi, A. (2014). Efficient Key Pre-distribution for 6LoWPAN. In L. Batten, G. Li, W. Niu, & M. Warren (Eds.), Applications and Techniques in Information Security (pp. 256-263). (Communications in Computer and Information Science; Vol. 490). Springer. http://link.springer.com/chapter/10.1007%2F978-3-662-45670-5_24
@inproceedings{c0fdb589fe8c4229bae64c7dfdf0a631,
title = "Efficient Key Pre-distribution for 6LoWPAN",
abstract = "The Internet of Things is imposing an evolution of the capabilities of wireless sensor networks. The new IP-based 6LoWPAN standard for low power sensor networks allows an almost seamless connection of local sensor networks to the Internet. On the other hand, the connection to the Internet also opens doors for unauthorized nodes to become part of the local network. The most important challenge in preventing this, is the implementation of a key management architecture, keeping in mind that the sensor nodes are constrained in power consumption and data storage capacity. This paper builds on a previously proposed symmetric key management scheme for 6LoWPAN networks presented by Smeets et al.in [1]. The original scheme is based on wired bootstrapping for the enrollment of new nodes, while the paper at hand proposes a wireless method. We analyze the original wired scheme and propose an improved wireless scheme, elaborating on the practical implementation on Zolertia Z1 nodes running Contiki-OS. We show that it is possible to provide end-to-end security using wireless bootstrapping within the constraints of the tiny nodes at hand.",
keywords = "6LoWPAN, Sensor Network Security, Zolertia Z1, Contiki",
author = "Ruben Smeets and Nele Mentens and K. Aerts and Dave Singelee and An Braeken and Matthias Carlier and Laurent Segers and Kris Steenhaut and Abdellah Touhafi",
year = "2014",
month = nov,
day = "26",
language = "English",
isbn = "978-3-662-45669-9",
series = "Communications in Computer and Information Science",
publisher = "Springer",
pages = "256--263",
editor = "L. Batten and G. Li and W. Niu and M. Warren",
booktitle = "Applications and Techniques in Information Security",
note = "International Conference on Applications and Techniques in Information Security, ATIS 2014 ; Conference date: 26-11-2014 Through 28-11-2014",
}