Publication detail

Secure Communication in a Heterogeneous Sensor System

ČOŽÍK, O. KADLEC, J. KUCHTA, R.

Original Title

Secure Communication in a Heterogeneous Sensor System

English Title

Secure Communication in a Heterogeneous Sensor System

Type

conference paper

Language

en

Original Abstract

The article deals with security of communication in a sensor system combining a wireless RF network and Ethernet. The article deals with design of complete secure sensor system combining a wireless RF network and Ethernet. Within the suitable sensor system topology design the requirements for the fast and efficient data exchange between individual logical system layers are taken into account. One of the major requirements for our design was to develop solution with minimum computing power consumed by the communication sensor nodes. The particular system layer security is based on the known security methods and protocols (TLS protocol, improved Diffie-Hellman protocol GDH.3), which have been extended by the methods needed for their practical use (method called AVOM, which is intended for discovering and labeling of all RF network devices). A partial goal of the designed solution is to improve the robustness of the implemented security mechanism for wireless logical group security key establishment.

English abstract

The article deals with security of communication in a sensor system combining a wireless RF network and Ethernet. The article deals with design of complete secure sensor system combining a wireless RF network and Ethernet. Within the suitable sensor system topology design the requirements for the fast and efficient data exchange between individual logical system layers are taken into account. One of the major requirements for our design was to develop solution with minimum computing power consumed by the communication sensor nodes. The particular system layer security is based on the known security methods and protocols (TLS protocol, improved Diffie-Hellman protocol GDH.3), which have been extended by the methods needed for their practical use (method called AVOM, which is intended for discovering and labeling of all RF network devices). A partial goal of the designed solution is to improve the robustness of the implemented security mechanism for wireless logical group security key establishment.

Keywords

RF network; TLS protocol; Diffie-Hellman protocol; GDH.3 protocol

RIV year

2015

Released

19.05.2015

Publisher

IARIA

Location

Barcelona

ISBN

978-1-61208-399-5

Book

ICONS 2015, The Tenth International Conference on Systems - Proceedings

Pages from

5

Pages to

13

Pages count

9

URL

BibTex


@inproceedings{BUT115701,
  author="Ondřej {Čožík} and Jaroslav {Kadlec} and Radek {Kuchta}",
  title="Secure Communication in a Heterogeneous Sensor System",
  annote="The article deals with security of communication in a sensor system combining a wireless RF network and Ethernet. The article deals with design of complete secure sensor system combining a wireless RF network and Ethernet. Within the suitable sensor system topology design the requirements for the fast and efficient data exchange between individual logical system layers are taken into account. One of the major requirements for our design was to develop solution with minimum computing power consumed by the communication sensor nodes. The particular system layer security is based on the known security methods and protocols (TLS protocol, improved Diffie-Hellman protocol GDH.3), which have been extended by the methods needed for their practical use (method called AVOM, which is intended for discovering and labeling of all RF network devices). A partial goal of the designed solution is to improve the robustness of the implemented security mechanism for wireless logical group security key establishment.",
  address="IARIA",
  booktitle="ICONS 2015, The Tenth International Conference on Systems - Proceedings",
  chapter="115701",
  howpublished="electronic, physical medium",
  institution="IARIA",
  year="2015",
  month="may",
  pages="5--13",
  publisher="IARIA",
  type="conference paper"
}