Skip to Main content Skip to Navigation
Conference papers

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications

Abstract : Confidentiality and integrity of wireless data transmissions are vital for sensor networks used in critical infrastructure assets. While the challenges could be addressed using standard encryption techniques, the sensors are often power-limited, bandwidth-constrained or too rudimentary to accommodate the power and latency overhead of robust encryption and decryption implementations. To address this gap, this chapter proposes a novel methodology in which data is split between two distinct wireless channels to achieve acceptable levels of data confidentiality and/or integrity. Threat scenarios are discussed in which an attacker gains access to one of the two communications channels to either eavesdrop on or modify data in transit. Given these threats, five data splitting methods are presented that employ the two-channel communications concept to detect and adapt to the attacks, and provide varying levels of data security. Additionally, a simple proof-of-concept packet structure is introduced that facilitates data transmission over the two channels in accordance with the data-splitting methods.
Document type :
Conference papers
Complete list of metadatas

Cited literature [7 references]  Display  Hide  Download
Contributor : Hal Ifip <>
Submitted on : Friday, March 22, 2019 - 9:29:27 AM
Last modification on : Friday, March 22, 2019 - 9:54:00 AM
Long-term archiving on: : Sunday, June 23, 2019 - 1:00:19 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Clark Wolfe, Scott Graham, Robert Mills, Scott Nykl, Paul Simon. Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. 12th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2018, Arlington, VA, United States. pp.81-90, ⟨10.1007/978-3-030-04537-1_5⟩. ⟨hal-02076301⟩



Record views