14. Secure Communication in Distributed Sensor Networks (DSN)

  1. Amiya Nayak B.Math., Ph.D. Adjunct Research Professor Associate Editor Full Professor2 and
  2. Ivan Stojmenović Ph.D. Chair Professor founder editor-in-chief2,3
  1. Subhamoy Maitra and
  2. Bimal Roy

Published Online: 1 MAR 2007

DOI: 10.1002/9780470175668.ch14

Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems

Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems

How to Cite

Maitra, S. and Roy, B. (2007) Secure Communication in Distributed Sensor Networks (DSN), in Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems (eds A. Nayak and I. Stojmenović), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470175668.ch14

Editor Information

  1. 2

    SITE, University of Ottawa, 800 King Edward Ave., Ottawa, ON K1N 6N5, Canada

  2. 3

    EECE, University of Birmingham, UK

Author Information

  1. Applied Statistical Unit, Indian Statistical Institute, 203 B.T. Road, Kolkata, India

Publication History

  1. Published Online: 1 MAR 2007
  2. Published Print: 14 FEB 2008

ISBN Information

Print ISBN: 9780470044926

Online ISBN: 9780470175668

SEARCH

Keywords:

  • distributed sensor networks (DSN) and secure communication;
  • key predistribution;
  • actual communication - low cost symmetric ciphers

Summary

The motivation of this chapter is to study the issues related to secure communication among sensor nodes. Sensor nodes are usually of limited computational ability having low CPU power, a small amount of memory, and constrained power availability. Thus the standard cryptographic algorithms suitable for state of the art computers may not be efficiently implemented in sensor nodes. In this regard we study the strategies that can work in constrained environments. First we present a basic introduction to the security issues in distributed wireless sensor networks. As implementation of public key infrastructure may not be recommendable in low end hardware platforms, we describe key predistribution issues in detail. Further we study some specific stream ciphers for encrypted communication that are suitable for implementation in low end hardware.