Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30073
Implementation of TinyHash based on Hash Algorithm for Sensor Network

Authors: HangRok Lee, YongJe Choi, HoWon Kim

Abstract:

In recent years, it has been proposed security architecture for sensor network.[2][4]. One of these, TinySec by Chris Kalof, Naveen Sastry, David Wagner had proposed Link layer security architecture, considering some problems of sensor network. (i.e : energy, bandwidth, computation capability,etc). The TinySec employs CBC_mode of encryption and CBC-MAC for authentication based on SkipJack Block Cipher. Currently, This TinySec is incorporated in the TinyOS for sensor network security. This paper introduces TinyHash based on general hash algorithm. TinyHash is the module in order to replace parts of authentication and integrity in the TinySec. it implies that apply hash algorithm on TinySec architecture. For compatibility about TinySec, Components in TinyHash is constructed as similar structure of TinySec. And TinyHash implements the HMAC component for authentication and the Digest component for integrity of messages. Additionally, we define the some interfaces for service associated with hash algorithm.

Keywords: sensor network security, nesC, TinySec, TinyOS, Hash, HMAC, integrity

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1084834

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2008

References:


[1] David Gay, Philip Levis, Robert von Behren "The nesC Language : A Holistic Approach to Networked Embedded Systems" PLDI-03 June 9-11
[2] Chris Karlof, Naveen Sastry, David Wagner "TinySec : A Link Layer Security Architecture for Wireless sensor Networks" SenSys-04 November
[3] David J. Malan, Matt Welsh, Michael D. Smith "A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography"
[4] Tieyan Li, Hongjun Wu, Xinkia Wang and Feng bao "SenSec Design" I2R Sensor Network Flagship Project : Technical Report-TR v1.0
[5] Ronald Watro, Derrick Kong,Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus " TinyPK : Securing Sensor Networks with Public Key Technology"
[6] Mihir Bellare, A. Desai, E. Jojipii, P. Rogaway. "The security of the cipher block chaining message authentication code" journal of Computer and System Sciences 61(3):362-399, December 2000
[7] FIPS PUBS 180-2 " SECURE HASH STANDARD" U.S DoC/NIST, Augest 1,2002
[8] FIPS PUBS #HMAC draft "The Keyed-Hash Message Authentication Code"
[9] "TinyOS and nesC Tutorial" http://www.tinyos.net/tinyos-1.x/doc/
[10] Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. "TAG : A tiny aggregation service for ad-hoc sensor networks." In The Fifth Symposium on Operatiing Systems Design and Implementation(OSDI 2002), 2002