A security scheme for wireless sensor networks

Fouchal, Hacene, Blesa Martínez, Javier, Romero Perales, Elena, Araujo Pinto, Álvaro ORCID: https://orcid.org/0000-0001-9269-5900 and Nieto-Taladriz García, Octavio ORCID: https://orcid.org/0000-0003-1411-6947 (2017). A security scheme for wireless sensor networks. In: "Global Communications Conference (GLOBECOM), 2016 IEEE", 04/12/2016 - 08/12/2016, Washington. ISBN 978-1-5090-1329-6. pp. 1-5. https://doi.org/10.1109/GLOCOM.2016.7841544.


Title: A security scheme for wireless sensor networks
  • Fouchal, Hacene
  • Blesa Martínez, Javier
  • Romero Perales, Elena
  • Araujo Pinto, Álvaro https://orcid.org/0000-0001-9269-5900
  • Nieto-Taladriz García, Octavio https://orcid.org/0000-0003-1411-6947
Item Type: Presentation at Congress or Conference (Article)
Event Title: Global Communications Conference (GLOBECOM), 2016 IEEE
Event Dates: 04/12/2016 - 08/12/2016
Event Location: Washington
Title of Book: Proceedings IEEE Globecom 2016
Date: 6 February 2017
ISBN: 978-1-5090-1329-6
Freetext Keywords: Wireless sensor networks, Authentication, Elliptic curves, Elliptic curve cryptography, Wireless communication
Faculty: E.T.S.I. Telecomunicación (UPM)
Department: Ingeniería Electrónica
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[thumbnail of INVE_MEM_2016_247567.pdf]
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) | Preview


Security is critical for wireless sensor networks (WSN)deployed in hostile environments since many types of attacks could reduce the trust on the global functioning of any WSN. Many solutions have been proposed to secure communications for WSNs and most of them rely on a centralized component which behaves as a certificate authority. We propose in this paper a distributed solution able to ensure authentication of nodes at any time without having any on-line access to a certificate authority. Each node will be equipped with a Trusted Platform Module (TPM) which is able to store keys with security. Each node will have its own public key and private key pair in the TPM and a certificate of the public key. The certificate is issued off-line when setting-up the node. When a node communicates with another, it has to sign the message with its own private key (done securely by the TPM) and sends the message, the signature and the certificate of the public key. The evaluation of the solution has been done using simulation and the overhead added by integrating authentication does not exceed 15% of energy consumption.

More information

Item ID: 46405
DC Identifier: https://oa.upm.es/46405/
OAI Identifier: oai:oa.upm.es:46405
DOI: 10.1109/GLOCOM.2016.7841544
Official URL: http://ieeexplore.ieee.org/document/7841544/
Deposited by: Memoria Investigacion
Deposited on: 12 Jun 2017 16:51
Last Modified: 12 Jun 2017 16:51
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM