Security architecture for wireless sensor networks

Master's thesis

Mikko Ala-Louko

Research output: ThesisMaster's thesisTheses

Abstract

This work presents the design, implementation and evaluation of a security ar- chitecture, targeted for smart environments that consist of ordinary, everyday objects with embedded wireless sensor network nodes. The security solution is integrated into a platform-independent middleware layer, that facilitates appli- cation development for these kinds of smart spaces. Consequently, the security architecture provides a constant level of security for applications, running on top of the middleware, that is independent of the underlying networking and hard- ware resources. To support the design process, a state-of-the-art survey on the current security solutions in wireless sensor networks is provided. In general level, the architecture consists of the middleware-level security solu- tion and a security management tool. The goal of the middleware-level security solution is to establish secure channels between the nodes of the network. To achieve this goal, the general security requirements of wireless sensor networks and the unique requirements set by the middleware had to be taken into account. As a result, the middleware-level solution was designed to utilize only symmet- ric cryptography. Due to the unavailability of the chosen security mechanisms for the used platform, a block cipher algorithm and a mode of operation were implemented as part of the work. The security management tool was designed to provide a novel, close prox- imity communications-based solution to the initial key distribution in the smart environment. The idea of the approach is to have the security management tool running in the user’s mobile device, which is then used to perform the necessary securitymanagement operations in the network fromtouching distance of a node. The approach conveniently solves the problem of confidentiality associated with the security management operations. The results of the evaluation proved the basic functionalities of the whole se- curity architecture to function as designed. The resource consumption of the middleware-level security solution turned out to be larger than the most light- weight solutions currently available. However, our solution builds on a stronger cryptographic foundation. The applicability of the close proximity key distribu- tion with the security management tool provided positive results
Original languageEnglish
QualificationMaster Degree
Awarding Institution
  • University of Oulu
Place of PublicationOulu
Publisher
Publication statusPublished - 2010
MoE publication typeG2 Master's thesis, polytechnic Master's thesis

Fingerprint

Middleware
Wireless sensor networks
Mobile devices
Cryptography
Hardware
Communication

Keywords

  • Software security
  • smart spaces
  • resource-constrained systems

Cite this

Ala-Louko, M. (2010). Security architecture for wireless sensor networks: Master's thesis. Oulu: University of Oulu.
Ala-Louko, Mikko. / Security architecture for wireless sensor networks : Master's thesis. Oulu : University of Oulu, 2010. 82 p.
@phdthesis{d409cefe60ca44d382ed359c09974670,
title = "Security architecture for wireless sensor networks: Master's thesis",
abstract = "This work presents the design, implementation and evaluation of a security ar- chitecture, targeted for smart environments that consist of ordinary, everyday objects with embedded wireless sensor network nodes. The security solution is integrated into a platform-independent middleware layer, that facilitates appli- cation development for these kinds of smart spaces. Consequently, the security architecture provides a constant level of security for applications, running on top of the middleware, that is independent of the underlying networking and hard- ware resources. To support the design process, a state-of-the-art survey on the current security solutions in wireless sensor networks is provided. In general level, the architecture consists of the middleware-level security solu- tion and a security management tool. The goal of the middleware-level security solution is to establish secure channels between the nodes of the network. To achieve this goal, the general security requirements of wireless sensor networks and the unique requirements set by the middleware had to be taken into account. As a result, the middleware-level solution was designed to utilize only symmet- ric cryptography. Due to the unavailability of the chosen security mechanisms for the used platform, a block cipher algorithm and a mode of operation were implemented as part of the work. The security management tool was designed to provide a novel, close prox- imity communications-based solution to the initial key distribution in the smart environment. The idea of the approach is to have the security management tool running in the user’s mobile device, which is then used to perform the necessary securitymanagement operations in the network fromtouching distance of a node. The approach conveniently solves the problem of confidentiality associated with the security management operations. The results of the evaluation proved the basic functionalities of the whole se- curity architecture to function as designed. The resource consumption of the middleware-level security solution turned out to be larger than the most light- weight solutions currently available. However, our solution builds on a stronger cryptographic foundation. The applicability of the close proximity key distribu- tion with the security management tool provided positive results",
keywords = "Software security, smart spaces, resource-constrained systems",
author = "Mikko Ala-Louko",
note = "CA2: TK805 Department of Electrical and Information Engineering : University of Oulu : Master’s thesis",
year = "2010",
language = "English",
publisher = "University of Oulu",
address = "Finland",
school = "University of Oulu",

}

Ala-Louko, M 2010, 'Security architecture for wireless sensor networks: Master's thesis', Master Degree, University of Oulu, Oulu.

Security architecture for wireless sensor networks : Master's thesis. / Ala-Louko, Mikko.

Oulu : University of Oulu, 2010. 82 p.

Research output: ThesisMaster's thesisTheses

TY - THES

T1 - Security architecture for wireless sensor networks

T2 - Master's thesis

AU - Ala-Louko, Mikko

N1 - CA2: TK805 Department of Electrical and Information Engineering : University of Oulu : Master’s thesis

PY - 2010

Y1 - 2010

N2 - This work presents the design, implementation and evaluation of a security ar- chitecture, targeted for smart environments that consist of ordinary, everyday objects with embedded wireless sensor network nodes. The security solution is integrated into a platform-independent middleware layer, that facilitates appli- cation development for these kinds of smart spaces. Consequently, the security architecture provides a constant level of security for applications, running on top of the middleware, that is independent of the underlying networking and hard- ware resources. To support the design process, a state-of-the-art survey on the current security solutions in wireless sensor networks is provided. In general level, the architecture consists of the middleware-level security solu- tion and a security management tool. The goal of the middleware-level security solution is to establish secure channels between the nodes of the network. To achieve this goal, the general security requirements of wireless sensor networks and the unique requirements set by the middleware had to be taken into account. As a result, the middleware-level solution was designed to utilize only symmet- ric cryptography. Due to the unavailability of the chosen security mechanisms for the used platform, a block cipher algorithm and a mode of operation were implemented as part of the work. The security management tool was designed to provide a novel, close prox- imity communications-based solution to the initial key distribution in the smart environment. The idea of the approach is to have the security management tool running in the user’s mobile device, which is then used to perform the necessary securitymanagement operations in the network fromtouching distance of a node. The approach conveniently solves the problem of confidentiality associated with the security management operations. The results of the evaluation proved the basic functionalities of the whole se- curity architecture to function as designed. The resource consumption of the middleware-level security solution turned out to be larger than the most light- weight solutions currently available. However, our solution builds on a stronger cryptographic foundation. The applicability of the close proximity key distribu- tion with the security management tool provided positive results

AB - This work presents the design, implementation and evaluation of a security ar- chitecture, targeted for smart environments that consist of ordinary, everyday objects with embedded wireless sensor network nodes. The security solution is integrated into a platform-independent middleware layer, that facilitates appli- cation development for these kinds of smart spaces. Consequently, the security architecture provides a constant level of security for applications, running on top of the middleware, that is independent of the underlying networking and hard- ware resources. To support the design process, a state-of-the-art survey on the current security solutions in wireless sensor networks is provided. In general level, the architecture consists of the middleware-level security solu- tion and a security management tool. The goal of the middleware-level security solution is to establish secure channels between the nodes of the network. To achieve this goal, the general security requirements of wireless sensor networks and the unique requirements set by the middleware had to be taken into account. As a result, the middleware-level solution was designed to utilize only symmet- ric cryptography. Due to the unavailability of the chosen security mechanisms for the used platform, a block cipher algorithm and a mode of operation were implemented as part of the work. The security management tool was designed to provide a novel, close prox- imity communications-based solution to the initial key distribution in the smart environment. The idea of the approach is to have the security management tool running in the user’s mobile device, which is then used to perform the necessary securitymanagement operations in the network fromtouching distance of a node. The approach conveniently solves the problem of confidentiality associated with the security management operations. The results of the evaluation proved the basic functionalities of the whole se- curity architecture to function as designed. The resource consumption of the middleware-level security solution turned out to be larger than the most light- weight solutions currently available. However, our solution builds on a stronger cryptographic foundation. The applicability of the close proximity key distribu- tion with the security management tool provided positive results

KW - Software security

KW - smart spaces

KW - resource-constrained systems

M3 - Master's thesis

PB - University of Oulu

CY - Oulu

ER -

Ala-Louko M. Security architecture for wireless sensor networks: Master's thesis. Oulu: University of Oulu, 2010. 82 p.