Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications - Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018
Conference Papers Year : 2018

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications

Abstract

Confidentiality and integrity of wireless data transmissions are vital for sensor networks used in critical infrastructure assets. While the challenges could be addressed using standard encryption techniques, the sensors are often power-limited, bandwidth-constrained or too rudimentary to accommodate the power and latency overhead of robust encryption and decryption implementations. To address this gap, this chapter proposes a novel methodology in which data is split between two distinct wireless channels to achieve acceptable levels of data confidentiality and/or integrity. Threat scenarios are discussed in which an attacker gains access to one of the two communications channels to either eavesdrop on or modify data in transit. Given these threats, five data splitting methods are presented that employ the two-channel communications concept to detect and adapt to the attacks, and provide varying levels of data security. Additionally, a simple proof-of-concept packet structure is introduced that facilitates data transmission over the two channels in accordance with the data-splitting methods.
Fichier principal
Vignette du fichier
476849_1_En_5_Chapter.pdf (162.62 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-02076301 , version 1 (22-03-2019)

Licence

Identifiers

Cite

Clark Wolfe, Scott Graham, Robert Mills, Scott Nykl, Paul Simon. Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. 12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.81-90, ⟨10.1007/978-3-030-04537-1_5⟩. ⟨hal-02076301⟩
38 View
73 Download

Altmetric

Share

More