2006 IEEE International Symposium on Consumer Electronics
DOI: 10.1109/isce.2006.1689441
|View full text |Cite
|
Sign up to set email alerts
|

KILAVI Wireless Communication Protocol for the Building Environment – Security Issues

Abstract: Asymmetric key cryptosystems are unsuitable for use in the resource constrained sensor nodes and typically the biggest challenge in all symmetric security systems is how to exchange the initial encryption key safely. In many communication protocols, this is carried out without any security procedure or the challenge has been left to the application developer to solve. If an adversary receives this first insecure message, the security of the whole network is threatened. This is a very serious security problem e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…With reference to closer works, the ZUMA middleware provides efficient end-to-end secure communication by means of Kilavi [43], a security protocol for home-automation applications. ZUMA secure communication services can be implemented within our architecture by properly implementing the corresponding component frameworks.…”
Section: Related Workmentioning
confidence: 99%
“…With reference to closer works, the ZUMA middleware provides efficient end-to-end secure communication by means of Kilavi [43], a security protocol for home-automation applications. ZUMA secure communication services can be implemented within our architecture by properly implementing the corresponding component frameworks.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], a link-layer security scheme, TinySec, was proposed. In [9], new node authentication and message encryption using the RC5 algorithm in counter (CTR) mode was addressed. The cryptographic keys are normally group-wise, pair-wise, or network-wise.…”
Section: Related Workmentioning
confidence: 99%
“…The Kilavi platform was developed at the Tampere University of Technology, Finland and consists of a physical sensor node platform in addition to a gateway device that manages the network. For more detailed information on the Kilavi platform and protocols; please see [6,7]. There are many issues that affect sensor network operation.…”
Section: Introductionmentioning
confidence: 99%