Team for Research in
Ubiquitous Secure Technology

MiniSec: A Secure Sensor Network Communication Architecture
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor

Citation
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor. "MiniSec: A Secure Sensor Network Communication Architecture". Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN), April, 2007.

Abstract
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protocols such as TinySec and ZigBee enjoy significant attention in the community. However, TinySec achieves low energy consumption by reducing the level of security provided. In contrast, ZigBee enjoys high security, but suffers from high energy consumption. MiniSec is a secure network layer that obtains the best of both worlds: low energy consumption and high security. MiniSec has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication. The latter does not require per-sender state for replay protection and thus scales to large networks. We present a publicly available implementation of MiniSec for the Telos platform, and experimental results demonstrate our low energy utilization.

Electronic downloads

Citation formats  
  • HTML
    Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor.
    <a href="http://www.truststc.org/pubs/197.html"
    >MiniSec: A Secure Sensor Network Communication
    Architecture</a>, Proceedings of IEEE International
    Conference on Information Processing in Sensor Networks
    (IPSN), April, 2007.
  • Plain text
    Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor.
    "MiniSec: A Secure Sensor Network Communication
    Architecture". Proceedings of IEEE International
    Conference on Information Processing in Sensor Networks
    (IPSN), April, 2007.
  • BibTeX
    @inproceedings{LukMezzourPerrigGligor07_MiniSecSecureSensorNetworkCommunicationArchitecture,
        author = {Mark Luk and Ghita Mezzour and Adrian Perrig and
                  Virgil D. Gligor},
        title = {MiniSec: A Secure Sensor Network Communication
                  Architecture},
        booktitle = {Proceedings of IEEE International Conference on
                  Information Processing in Sensor Networks (IPSN)},
        month = {April},
        year = {2007},
        abstract = {Secure sensor network communication protocols need
                  to provide three basic properties: data secrecy,
                  authentication, and replay protection. Secure
                  sensor network link layer protocols such as
                  TinySec and ZigBee enjoy significant attention in
                  the community. However, TinySec achieves low
                  energy consumption by reducing the level of
                  security provided. In contrast, ZigBee enjoys high
                  security, but suffers from high energy
                  consumption. MiniSec is a secure network layer
                  that obtains the best of both worlds: low energy
                  consumption and high security. MiniSec has two
                  operating modes, one tailored for single-source
                  communication, and another tailored for
                  multi-source broadcast communication. The latter
                  does not require per-sender state for replay
                  protection and thus scales to large networks. We
                  present a publicly available implementation of
                  MiniSec for the Telos platform, and experimental
                  results demonstrate our low energy utilization. },
        URL = {http://www.truststc.org/pubs/197.html}
    }
    

Posted by Adrian Perrig on 11 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.