Path metric authentication for low-power and lossy networks
2015 (English)In: 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWater 2015, Association for Computing Machinery (ACM), 2015Conference paper (Refereed)Text
Cyber physical systems often require sensor networks to perform unattended operation for a long time, while providing performance guarantees for monitoring and control applications. Since this poses requirements on the formed wireless sensor network topology, routing protocols provide a means to construct topologies according to complex objective functions, involving several routing metrics. As the metric values affect the emerging topology significantly, they need to be protected, to avoid topology formation attacks from malicious users. In this paper we consider the specific case of RPL based routing and propose a lightweight authentication approach to protect RPL path metrics. We evaluate the cost of metric authentication and show how to tradeoff the introduced tree construction delay and the achieved metric accuracy.
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2015.
Authentication, Complex networks, Electric network topology, Embedded systems, Topology, Wireless sensor networks, Cyber physical systems (CPSs), Emerging topologies, Metric accuracy, Monitoring and control, Objective functions, Performance guarantees, Topology formation, Tree construction, Low power electronics
IdentifiersURN: urn:nbn:se:kth:diva-181635DOI: 10.1145/2738935.2738941ScopusID: 2-s2.0-84945255788ISBN: 9781450334853OAI: oai:DiVA.org:kth-181635DiVA: diva2:911307
1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWater 2015, 13 April 2015 through 16 April 2015
QC 201603112016-03-112016-02-022016-03-11Bibliographically approved