The Internet of Things is imposing an evolution of the capabilities of wireless sensor networks. The new IP-based 6LoWPAN standard for low power sensor networks allows an almost seamless connection of local sensor networks to the Internet. On the other hand, the connection to the Internet also opens doors for unauthorized nodes to become part of the local network. The most important challenge in preventing this, is the implementation of a key management architecture, keeping in mind that the sensor nodes are constrained in power consumption and data storage capacity. This paper builds on a previously proposed symmetric key management scheme for 6LoWPAN networks presented by Smeets et al.in [1]. The original scheme is based on wired bootstrapping for the enrollment of new nodes, while the paper at hand proposes a wireless method. We analyze the original wired scheme and propose an improved wireless scheme, elaborating on the practical implementation on Zolertia Z1 nodes running Contiki-OS. We show that it is possible to provide end-to-end security using wireless bootstrapping within the constraints of the tiny nodes at hand.
Original languageEnglish
Title of host publicationApplications and Techniques in Information Security
EditorsL. Batten, G. Li, W. Niu, M. Warren
PublisherSpringer
Pages256-263
Number of pages8
ISBN (Electronic)978-3-662-45670-5
ISBN (Print)978-3-662-45669-9
Publication statusPublished - 26 Nov 2014
EventInternational Conference on Applications and Techniques in Information Security - Melbourne, Australia
Duration: 26 Nov 201428 Nov 2014

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer
Volume490
ISSN (Print)1865-0929

Conference

ConferenceInternational Conference on Applications and Techniques in Information Security
Abbreviated titleATIS 2014
CountryAustralia
CityMelbourne
Period26/11/1428/11/14

    Research areas

  • 6LoWPAN, Sensor Network Security, Zolertia Z1, Contiki

ID: 2492544