<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0717-5000</journal-id>
<journal-title><![CDATA[CLEI Electronic Journal]]></journal-title>
<abbrev-journal-title><![CDATA[CLEIej]]></abbrev-journal-title>
<issn>0717-5000</issn>
<publisher>
<publisher-name><![CDATA[Centro Latinoamericano de Estudios en Informática]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0717-50002011000100009</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kazienko]]></surname>
<given-names><![CDATA[Juliano F.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ribeiro]]></surname>
<given-names><![CDATA[Igor G.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Moraes]]></surname>
<given-names><![CDATA[Igor M.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Albuquerque]]></surname>
<given-names><![CDATA[Célio V. N.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidade Federal Fluminense Instituto de Computaçao ]]></institution>
<addr-line><![CDATA[Niterói RJ]]></addr-line>
<country>Brasil</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2011</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2011</year>
</pub-date>
<volume>14</volume>
<numero>1</numero>
<fpage>8</fpage>
<lpage>8</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_arttext&amp;pid=S0717-50002011000100009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_abstract&amp;pid=S0717-50002011000100009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_pdf&amp;pid=S0717-50002011000100009&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks (WSNs). A number of researchers claim that cryptographic mechanisms demand plenty of resources from sensors. In this context, an important issue is to develop lightweight encryption mechanisms capable of running in resource-constrained sensors. The main contribution of this work is to carry out an experimental evaluation of a secure key distribution and storage scheme in a WSN using simulation and practical experiments. Through simulation, we verify that this scheme introduces very low processing overhead, in the order of nanoseconds, when compared to existing approaches. Additionally, practical measurements indicate that the scheme can be deployed by off-the-shelf sensor platforms, such as MicaZ and TelosB. The performance metrics considered are the processing time of encryption and decryption functions, the application memory requirements and the power consumption. We have also evaluated several functionalities of the scheme on a real testbed. In summary, this work demonstrates the practical feasibility of implementing such scheme in real sensor networks.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[O sistema TinyOS é uma importante plataforma amplamente utilizada para realizar experimentos relacionados a Redes de Sensores Sem Fio (RSSFs). Alguns pesquisadores afirmam que mecanismos de criptografia exigem um consumo excessivo de recursos de sensores. Neste contexto, torna-se desafiador desenvolver mecanismos leves de criptografia a fim de que sejam executados em dispositivos com recursos limitados, como sensores. A principal contribuição deste trabalho consiste em realizar uma avaliação experimental de um esquema seguro de distribuição e armazenamento de chaves em uma RSSF, usando simulação e experimentos práticos. Através de simulação, verifica-se que esse esquema provoca uma sobrecarga de processamento muito baixa, da ordem de nanossegundos, quando comparado a abordagens existentes. Além disso, medidas práticas indicam que o esquema pode ser executado em plataformas de sensores comercialmente disponíveis, tais como MicaZ e TelosB. As métricas de desempenho consideradas são o tempo de processamento das funções de cifração e decifração, os requisitos de memória da aplicação e o consumo de energia. Adicionalmente, foram avaliadas várias funcionalidades do esquema através de uma plataforma de testes real. Desse modo, este trabalho demonstra a viabilidade prática de implementar tal esquema em redes de sensores reais.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Wireless Sensor Networks]]></kwd>
<kwd lng="en"><![CDATA[Security]]></kwd>
<kwd lng="en"><![CDATA[Key Storage]]></kwd>
<kwd lng="en"><![CDATA[Key Distribution]]></kwd>
<kwd lng="en"><![CDATA[TOSSIM]]></kwd>
<kwd lng="en"><![CDATA[TinyOS]]></kwd>
<kwd lng="pt"><![CDATA[Redes de Sensores Sem Fio]]></kwd>
<kwd lng="pt"><![CDATA[Segurança]]></kwd>
<kwd lng="pt"><![CDATA[Armazenamento de Chaves]]></kwd>
<kwd lng="pt"><![CDATA[Distribuição de Chaves]]></kwd>
<kwd lng="pt"><![CDATA[TOSSIM]]></kwd>
<kwd lng="pt"><![CDATA[TinyOS]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <div type="HEADER">     <p style="margin-bottom: 0.65cm;" align="center" lang="en-US"> <font face="Verdana" size="2">    <br>      </font>      </p>      </div>      <font face="Verdana" size="2">          <br>      </font>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font size="4" face="Verdana"><b>Practical Evaluation of a Secure Key-Distribution and Storage Scheme for Wireless Sensor Networks Using TinyOS</b></font></p>          <p style="margin-bottom: 0cm;" lang="en-US"><font face="Verdana" size="2">    <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="3" face="Verdana"><span lang="pt-BR"><b>Juliano F. Kazienko, Igor G. Ribeiro, Igor M. Moraes, and C&eacute;lio V. N. Albuquerque</b></span></font></p>          <p style="margin-bottom: 0cm;" align="center" lang="pt-BR"> <font face="Verdana" size="2">Instituto de Computa&ccedil;&atilde;o &ndash; Universidade Federal Fluminense (UFF)</font></p>          <p style="margin-bottom: 0cm;" align="center" lang="pt-BR"> <font face="Verdana" size="2">Rua Passo da P&aacute;tria, 156 &ndash; 24.210-240 &ndash; Niter&oacute;i &ndash; RJ &ndash; Brasil</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <span lang="pt-BR"><i>{<a href="mailto:kazienko@ic.uff.br">kazienko</a>,<a href="mailto:igor@ic.uff.br">igor</a>,<a href="celio@ic.uff.br">celio</a>}@ic.uff.br, <a href="mailto:igorcompuff@bcc.ic.uff.br">igorcompuff@bcc.ic.uff.br</a></i></span></font></p>          <p style="margin-bottom: 0cm;" lang="pt-BR"><font face="Verdana" size="2">    <br>      </font>      </p>          <p style="margin-left: 1.27cm; margin-right: 1.26cm; margin-bottom: 0cm;" align="justify" lang="pt-BR"> <font size="2" face="Verdana"><b>Abstract</b></font></p>          <p style="margin-left: 1.27cm; margin-right: 1.26cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">TinyOS is a major platform broadly used to carry out experiments related to Wireless Sensor Networks (WSNs). A number of researchers claim that cryptographic mechanisms demand plenty of resources from sensors. In this context, an important issue is to develop lightweight encryption mechanisms capable of running in resource-constrained sensors. The main contribution of this work is to carry out an experimental evaluation of a secure key distribution and storage scheme in a WSN using simulation and practical experiments. Through simulation, we verify that this scheme introduces very low processing overhead, in the order of nanoseconds, when compared to existing approaches. Additionally, practical measurements indicate that the scheme can be deployed by off-the-shelf sensor platforms, such as MicaZ and TelosB. The performance metrics considered are the processing time of encryption and decryption functions, the application memory requirements and the power consumption. We have also evaluated several functionalities of the scheme on a real testbed. In summary, this work demonstrates the practical feasibility of implementing such scheme in real sensor networks. </font></p>          <p style="margin-left: 1.27cm; margin-right: 1.26cm; margin-bottom: 0cm;" align="justify" lang="pt-BR"> <font size="2" face="Verdana"><b>Portuguese abstract</b></font></p>        <p style="margin-left: 1.27cm; margin-right: 1.26cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">O sistema TinyOS &eacute; uma importante plataforma amplamente utilizada para realizar experimentos relacionados a Redes de Sensores Sem Fio (RSSFs). Alguns pesquisadores afirmam que mecanismos de criptografia exigem um consumo excessivo de recursos de sensores. Neste contexto, torna-se desafiador desenvolver mecanismos leves de criptografia a fim de que sejam executados em dispositivos com recursos limitados, como sensores. A principal contribui&ccedil;&atilde;o deste trabalho consiste em realizar uma avalia&ccedil;&atilde;o experimental de um esquema seguro de distribui&ccedil;&atilde;o e armazenamento de chaves em uma RSSF, usando simula&ccedil;&atilde;o e experimentos pr&aacute;ticos. Atrav&eacute;s de simula&ccedil;&atilde;o, verifica-se que esse esquema provoca uma sobrecarga de processamento muito baixa, da ordem de nanossegundos, quando comparado a abordagens existentes. Al&eacute;m disso, medidas pr&aacute;ticas indicam que o esquema pode ser executado em plataformas de sensores comercialmente dispon&iacute;veis, tais como MicaZ e TelosB. As m&eacute;tricas de desempenho consideradas s&atilde;o o tempo de processamento das fun&ccedil;&otilde;es de cifra&ccedil;&atilde;o e decifra&ccedil;&atilde;o, os requisitos de mem&oacute;ria da aplica&ccedil;&atilde;o e o consumo de energia. Adicionalmente, foram avaliadas v&aacute;rias funcionalidades do esquema atrav&eacute;s de uma plataforma de testes real. Desse modo, este trabalho demonstra a viabilidade pr&aacute;tica de implementar tal esquema em redes de sensores reais. </font></p>          <p style="margin-left: 1.27cm; margin-right: 1.26cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>Keywords:</b> Wireless Sensor Networks; Security; Key Storage; Key Distribution; TOSSIM; TinyOS.     <br>    <b>Portuguese Keywords:</b> Redes de Sensores Sem Fio; Seguran&ccedil;a; Armazenamento de Chaves; Distribui&ccedil;&atilde;o de Chaves; TOSSIM; TinyOS. </font></p>   <font face="Verdana" size="2">       <br>    Received 2011-Jan-24, Revised 2011-Mar-31, Accepted 2011-Mar-31 </font>       ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" lang="en-US"><font face="Verdana" size="2">    <br>      </font>      </p>          <p style="margin-bottom: 0cm;" lang="en-US"><font face="Verdana"><b> <font size="2">1. </font> </b><font style="font-size: 10pt;" size="3"><b>I</b></font><b><font size="2">NTRODUCTION</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Wireless Sensor Networks (WSNs) demand precise mechanisms to evaluate the feasibility of proposed solutions. WSNs are a particular case of wireless ad hoc networks. They are composed of sensor nodes, also known as motes, typically with constrained resources that use multihop communication to reach powerful sink nodes. These networks have been applied to wildlife monitoring, detection of nuclear material, underwater communication as well as in many other applications [<a href="#c1">1</a>,<a href="#c2">2</a>,<a href="#c3">3</a><a href="#c6">,6</a><a href="#c12">,12</a>]<a name="c1."></a><a name="c2."></a><a name="c3."></a><a name="c6."></a><a name="c12."></a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The TinyOS platform has been broadly used by the research community to evaluate WSN experiments. An interesting feature of this platform is that it enables the development of an application-specific operating system that runs on sensors as well as on a simulated environment [<a href="#c10">10</a>,<a href="#c16">16</a>,<a href="#c17">17</a>]<a name="c10."></a><a name="c16."></a><a name="c17."></a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Among challenging topics in WSNs, security certainly drives many issues. However, it is frequently claimed that standard security mechanisms are prohibitive in WSNs because they implicate in the extensive use of scarce resources, such as processing power, battery capacity, limited memory, and low bandwidth. Moreover, sensors typically operate in unattended way. Therefore, it becomes very important to protect sensitive data stored in sensors, as well as cryptographic keys [<a href="#c2">2</a>,<a href="#c11">11</a>]<a name="c11."></a>. Thus, it is important to propose and evaluate security mechanisms for sensor networks. Besides, we must show that such proposals are feasible to run in such resource-constrained platform. In order to accomplish these goals, implementation and practical experiments are required.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The main contribution of this work is to carry out an experimental evaluation of the secure key-distribution and storage scheme for WSNs previously proposed by Kazienko and Albuquerque [<a href="#c14">14,</a><a href="#c15">15</a>]<a name="c14."></a><a name="c15."></a>. In order to demonstrate that their scheme provides a lightweight key encryption mechanism, we perform simulation and practical experiments. Simulations are carried out in order to verify the processing overhead of their scheme when compared to the proposal of Oliveira and Barros [<a href="#c20">20</a>]<a name="c20."></a> and to a system without cryptography. Additionally, we carry out practical experiments with the off-the-shelf sensors platforms TelosB and MicaZ, considering performance metrics such as the processing time of encryption and decryption functions, application memory requirements, and power consumption. We have also evaluated several functionalities of this scheme. Hence, this work demonstrates the practical feasibility of implementing their scheme in real sensor networks.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The remainder of this work is organized as follows. Section 2 addresses the related works. Section 3 briefly describes the scheme proposed by Kazienko and Albuquerque. In Section 4, the methodology is presented. Section 5 describes the experiments carried out. Section 6 shows the simulation results and the comparison to related work. Section 7 presents practical experiments accomplished using TelosB and MicaZ motes. Finally, in Section 8, the conclusion and future works are presented.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">2. </font> </b><font style="font-size: 10pt;" size="3"><b>R</b></font><b><font size="2">ELATED</font></b><font style="font-size: 10pt;" size="3"><b> W</b></font><b><font size="2">ORKS</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">It is possible to find a large number of symmetric key distribution mechanisms in the scientific literature. In a broad sense, there are three well-known strategies to perform this task, using: Public-key cryptosystems, Key Distribution Center (KDC) and Key predistribution <a href="#c22">[22</a>].<a name="c22."></a></font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The first one invariably uses asymmetric keys in order to distribute symmetrical secret keys. The main disadvantage of such strategy is related to the energy consumption and to the memory usage since&#61630;in sensors&#61630;those resources are scarce. However, it is possible to find works that consider their use to be feasible in WSNs <a href="#c21">[21]</a><a name="c21."></a>. The second one concerns the well-known Key Distribution Center, in which a central node shares secret keys with all network nodes. Symmetric keys are protected by secret keys during distribution. Although efficient, KDC presents a single point of failure. The third class of strategies is key predistribution. In this paradigm, keys are distributed among sensors before the network becomes operational. In most predistribution schemes, a group of keys is generated, in which a portion of that group is loaded in each sensor. After this phase, sensors use their keys to establish secure channels with each other, as presented by Eschenauer and Gligor <a href="#c8">[8]</a><a name="c8."></a>. In such work, the authors propose a key-management scheme for distributed sensor networks and recognize the need for secure key storage in sensors. However, they do not propose a mechanism to solve such problem.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Martina <i>et al.</i> <a href="#c19">[19]</a><a name="c19."></a> propose the use of Hardware Security Module (HSM) to protect private keys against attacks related to logical and physical tampering with or even related to the extraction of sensitive information from the protected area. Even though HSM has been applied to a Public Key Infrastructure in the aforementioned work, its use is particularly applicable in devices that use symmetrical cryptography with the purpose of establishing a safe communication. Such module can concentrate critical functions and data, such as cryptographic keys, for instance.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Recently, several works have highlighted the benefits of increasing throughput and reliability reducing the number of transmissions in computer networks due to the application of network coding techniques [<a href="#c9">9</a>,<a href="#c13">13</a>].<a name="c9."></a><a name="c13."></a> Those benefits become even more important in sensor network environments where resources are scarce. Network coding consists of a combination of packets to be transmitted. Such technique has security properties intrinsically related since more than one message is codified in only one. A particular kind of combination based on bitwise exclusive-OR operations has been used by well-known cipher families for encryption and decryption of messages, for example, the <i>Vernam</i> cipher.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Oliveira and Barros <a href="#c20">[20]</a> proposed a system based on predistribution, mobility and distribution of keys using network coding. In such scheme, the task of key distribution in a WSN is accomplished by a mobile node. This system, however, has a limitation: it allows an attacker to discover all keys used in the system when accessing the data in any sensor along with the mobile node memory access. On the other hand, the system proposed by Kazienko and Albuquerque <a href="#c14">[14]</a> deals with the problem of security in sensor networks from a broader perspective. The work of Kazienko and Albuquerque <a href="#c14">[14]</a> considers the need for secure key storage in sensor nodes quite important since they are great in number and their content is, in thesis, more subject to capturing and tampering attempts. Thus, besides security in key distribution it is also intended&#61630;as explained in Section 3&#61630;to provide a larger resiliency and robustness to the system in such a way that the sensors' capturing and tampering will not result in any key discovery.</font></p>      <font face="Verdana" size="2">          <br>      </font>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">3. </font> </b><font style="font-size: 10pt;" size="3"><b>S</b></font><b><font size="2">YSTEM'S </font> </b><font style="font-size: 10pt;" size="3"><b>D</b></font><b><font size="2">ESCRIPTION</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In their previous work <a href="#c14">[14]</a>, Kazienko and Albuquerque have introduced a secure key distribution and storage scheme for WSNs. That system is depicted in <a href="#f1">Figure 1</a>. The main contribution is a mechanism to solve the stored key exposure problem. This is pointed out in the key management research area as relevant and open issue, especially for WSNs [<a href="#c11">11</a>,<a href="#c22">22</a>].</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Sensors typically operate unattended and a secure key storage is necessary in order to protect key material stored in a given sensor. Additionally, the authors have proved mathematically that their proposal increases the system security <a href="#c14">[14]</a>. In such scheme, a special node called Mobile Node (MN) is used during the key distribution phase. Their main conclusion is that the probability of system key discovery remains the same even when an attacker gains access to the memory content of the MN and of a regular sensor of the network, simultaneously. Such proof is solely mathematically. The present research effort intends to extend this validation in order to demonstrate the scheme's feasibility through a practical evaluation.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <font size="2">The scheme is basically composed of two phases. The first one is a predistribution phase, in which a set of keys is generated and loaded into the sensors. The second one is the operational phase, where pairwise key distribution based on network coding takes place <a href="#c9">[9</a>,<a href="#c13">13</a>]. MN accomplishes a combination of two keys using an exclusive-OR operation in the form K</font><sub><font size="2">i</font></sub><font size="2">(A) &#61637;</font></font><font size="2" face="Verdana"> R &#61637;</font><font face="Verdana"><font size="2"> K</font><sub><font size="2">i</font></sub><font size="2">(B) &#61637; R, which results in K</font><sub><font size="2">i</font></sub><font size="2">(A) &#61637; K</font><sub><font size="2">i</font></sub><font size="2">(B). Such information is sent through the wireless medium and received by the sensors which, in turn, recover the key from each other in an encrypted way. Such encryption is accomplished with a pre-stored secret Z</font><sub><font size="2">i</font></sub><font size="2"> present within a tamper proof area called Cryptographic Module (CM) [<a href="#c7">7</a>,<a href="#c18">18</a>,<a href="#c19">19</a>]<a name="c7."></a><a name="c18."></a> of sensor <i>i</i>. Afterwards, that same secret Z</font><sub><font size="2">i</font></sub><font size="2"> is used to decrypt the key and, finally, encrypt messages that will be sent.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     ]]></body>
<body><![CDATA[<br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="width: 513px; height: 363px;" src="/img/revistas/cleiej/v14n1/1a09f1.gif" name="Objeto1"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana"> <font style="font-size: 10pt;" size="2"><b><a name="f1"></a>Figure 1</b>. Kazienko and Albuquerque scheme</font><font size="2"> </font><font style="font-size: 10pt;" size="2">for pairwise symmetric key distribution and secure storage by network sensor nodes. A secret key <i>Zi</i> is a parameter of the Cryptographic Module (CM). Such secret is used to encrypt all other sensor keys stored into its flash memory.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Differently from Kazienko and Albuquerque&rsquo;s scheme, the key distribution system proposed by Oliveira and Barros <a href="#c20">[20]</a> presented in <a href="#f2">Figure 2</a> does not accomplish the secure key storage. This is a problem because the keys used in the system may be discovered if an attacker captures a regular sensor of the network and the MN, simultaneously. This problem is solved by the scheme of Kazienko and Albuquerque. In this work, we compare both schemes through simulation. Additionally, we evaluate a system without cryptography that sends messages and stores keys as plain text.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Beyond the confidentiality, it is important to provide authentication. With this purpose, an authentication protocol of sensors avoids the distribution of keys to fake nodes. Due to this fact, such authentication should take place before the key distribution phase in order to verify the node's legitimacy. Kazienko and Albuquerque also define an authentication protocol <a href="#r14">[14]</a>, which derives from a Key Distribution Center. The MN shares different keys with each node of the network. During the authentication phase, it uses a nonce-based challenge-response scheme. Each sensor replies the encrypted version of the nonces with its own key and then MN verifies it and authenticates the sensor.</font></p>      <font face="Verdana" size="2">          <br>      </font>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="width: 417px; height: 239px;" src="/img/revistas/cleiej/v14n1/1a09f2.gif" name="Objeto2"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana"> <font style="font-size: 10pt;" size="2"><b><a name="f2"></a>Figure 2</b>. </font><font size="2">Oliveira and Barros scheme</font><font style="font-size: 10pt;" size="2"> <a href="#c20">[20]</a> for pairwise cryptographic key distribution in a WSN. The keys are stored as plain text into sensors A and B. If the MN and a regular sensor of the network are captured, it is easy to derive the information <i>R</i> that is used to encrypt all system's keys compromising the security.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">4. </font> </b><font style="font-size: 10pt;" size="3"><b>M</b></font><b><font size="2">ETHODOLOGY</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In this work, the following tools, environments, and platforms are used to develop the experiments with sensor nodes:</font></p>      <ul>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana"><i>TinyOS</i> <a href="#c17">[17]</a> is a component-based operating system specifically developed for WSNs. TinyOS is written in nesC language and it is free and open source;</font></p>        </li>            ]]></body>
<body><![CDATA[<li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana"><i>nesC</i> (network embedded systems C) <a href="#c10">[10]</a> is a dialect of C language. It is an event-driven programming language used to create sensor applications to run on TinyOS;</font></p>        </li>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana"><i>TOSSIM</i> <a href="#c16">[16]</a> is the TinyOS Simulator. More specifically, it is a library of TinyOS. TOSSIM is widely used by researchers because the same code developed for simulation runs on the real sensor hardware. This feature makes the development of WSN applications faster. TOSSIM is a discrete event simulator and works by translating hardware interrupts into discrete events;</font></p>        </li>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana"><i>XubuntOS</i> is a Linux distribution with the TinyOS programming framework embedded. This distribution allows the development of TinyOS applications because a given code may be compiled to a specific sensor platform.</font></p>        </li>          </ul>      <font size="2" face="Verdana"><b>4.1 The </b><i><b>nesC</b></i><b> Programming Language</b> </font>     <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The nesC programming language is an extension of C language designed to generate optimized code for embedded systems like sensor nodes in a WSN. All applications written in nesC are developed through the construction and reuse of pieces of code called components. The components are divided into two categories: modules and configurations. The module contains the implementation of the algorithms themselves through declarations of variables, functions, etc. The settings are used to connect components to assemble larger and more complex components. Besides the modules and configurations, there are also interfaces that are composed of function signatures&#61630;without implementation&#61630;and can be provided or used by the components. The functions contained in the interfaces can represent actions or events where actions must be implemented by the component that provides the interface while the events should be implemented by the component that uses it. The interfaces implemented by a component are the only means of accessing that component <a href="#c10">[10]</a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>4.2 The TinyOS Operating System</b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The TinyOS operating system, developed in nesC, is designed to assist the development of applications for WSNs. Its philosophy differs radically from traditional operating systems since it does not reside in the sensors independently from applications. In fact, when a program is developed, it uses components that represent abstractions of real components of the hardware to perform the desired activities. Thus, TinyOS can be considered a framework for developing applications for sensors <a href="#c17">[17]</a>. </font> </p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The development of a system aided by TinyOS consists in creating components using other components already available in the framework. For example, in the sensor application development accomplished in this work, we developed a component that exchanges encrypted messages among sensors. The logic behind this application is developed but how sensors send packets to the real network interface is abstracted through communication-specific components of TinyOS. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>4.3 The TOSSIM Simulator</b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">TOSSIM is a simulator for WSNs that comes along with the TinyOS environment <a href="#c16">[16]</a>. In order to run simulations, one must first define the desired network topology to be simulated and the channel noise model. The topology provides the identifiers for each node, the links among network nodes, and the signal strength of each of these links. The noise model is used to simulate the noise in the environments where a WSN should operate. After the establishment of the topology, it is necessary to build a Python script setting out guidelines on how the execution of the simulation must proceed. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Debug information may be obtained about the application being simulated with the use of the <i>dbg </i>command. The <i>dbg</i> command prints out certain data in an output device such as screen or a text file. The output device used is defined by creating a channel in the Python script. The channel has a name and it should be passed as an argument to the function <i>dbg</i> in the program written in nesC.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">5. </font> </b><font style="font-size: 10pt;" size="3"><b>E</b></font><b><font size="2">XPERIMENTS</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In this section, the components of a sensor and the simulation scenario are described.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>5.1 Sensor's Components</b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Nowadays, available sensors consist of a set of embedded hardware with limited resources. A typical sensor node is composed of four components:</font></p>      <ul>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana">A <i>power unit</i>, responsible for supplying energy to other components;</font></p>        </li>            ]]></body>
<body><![CDATA[<li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana">A <i>sensing unit</i>, that actually contains the sensor, for instance, of light, humidity, temperature, etc;</font></p>        </li>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana">A <i>computing unit</i>, composed of RAM and flash memories and a processor that typically uses a set of analog-to-digital converters (ADCs) to obtain data from sensors and communications protocols;</font></p>        </li>            <li>                             <p style="margin-bottom: 0cm;" align="justify" lang="en-US">      <font size="2" face="Verdana">A <i>communication unit</i>, used to send and receive radio signals.</font></p>        </li>          </ul>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a href="#f3">Figure 3</a> presents the general schematic of a typical sensor node hardware <a href="#c1">[1</a>,<a href="#c2">2</a>].</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="border: 0px solid ; width: 350px; height: 174px;" src="/img/revistas/cleiej/v14n1/1a09f3.gif" name="gr&aacute;ficos1"></font></p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="f3"></a>Figure 3</b>. General schematic of a typical sensor node hardware. The main components are the power, sensing, computing, and communication units.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">With the purpose of mapping to the real world architecture aforementioned, one kind of mote used in this work is the off-the-shelf sensor TelosB (from UC Berkeley, Crossbow). It consists of 16-bit Texas Inst. MSP430 F1611 processor, 10 kB of RAM memory, 48 kB of flash memory, transmission rate of 250 kb/s by using a Bluetooth radio and it is programmable through a USB interface <a href="#c5">[5]</a><a name="c5."></a>. Another kind of mote also used in this work is the MicaZ that consists of a processor Atmel ATmega 128L MPR2400, 4 kB of RAM memory, 128 kB of flash memory, and transmission rate of 250 kb/s with Bluetooth radio <a href="#c4">[4]</a>.<a name="c4."></a> Both motes are equipped with the radio model TI CC2420.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In our simulation experiments, the same code plays the tasks of key distribution and of sending/receiving messages. Thus, just one mote plays the role of key distribution while the other motes are regular motes, that is, they only send and receive encrypted messages. On other hand, in the practical experiments presented in Section 7, we split the code in key distribution code and regular mote code in order to avoid the loading of unnecessary code in the sensors. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">As a last observation, it is important to highlight that the TinyOS Simulator considers only the MicaZ architecture in its compilation process. Therefore, our simulation experiments use such architecture. Besides, such feature facilitates the loading of simulated code mainly into MicaZ real sensors. In the practical experiments, we also consider one TelosB mote.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>      <font size="2" face="Verdana"><b>5.2 Simulation Scenario</b> </font>     <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In this work, we have implemented and modeled three WSN communication scenarios. The <i>first scenario</i> is the one that considers the system introduced by Kazienko and Albuquerque <a href="#r14">[14]</a>, i. e., a system with secure key distribution and storage. As the key storage is encrypted, it is necessary to decrypt the key before its use. The <i>second scenario</i> considers the scheme proposed by Oliveira and Barros <a href="#c20">[20]</a>. In such communication scheme there is a secure key distribution, but not secure key storage. The keys are stored in sensor's RAM as plain text and, therefore, there is no need to do any decryption of keys prior to sending messages. The <i>third scenario</i> does not use any cryptography. There is no key distribution and the messages are sent through the wireless medium as plain text.</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <font size="2">In <a href="#f4">Figure 4</a>, our experimental evaluating scenario is depicted. We have implemented the operational phase of the Kazienko and Albuquerque scheme, shown in <a href="#f1">Figure 1</a>, with some modifications. Firstly, all sensor's keys are loaded in RAM memory instead of in sensor's flash memory. Additionally, since CM is not present in our sensors we assume that the secret <i>Z</i></font><sub><font size="2"><i>i</i></font></sub><font size="2"> is stored in memory. <i>Z</i></font><sub><font size="2"><i>i</i></font></sub><font size="2"> is a sensitive information used to encrypt all other keys of the sensor. In this first scenario, such information is stored into the sensor's RAM memory only for experimental purposes.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="width: 327px; height: 281px;" src="/img/revistas/cleiej/v14n1/1a09f4.gif" name="Objeto3"></font></p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana"> <a name="f4"><font size="2"></font></a><font style="font-size: 10pt;" size="2"><b>Figure 4</b>. Experimental evaluating scenario based on <a href="#c14">[14]</a>. The operational phase of such scheme was modeled and implemented. All keys are stored into the RAM memory of the sensor.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The evaluation scenario is composed of three sensor nodes. The TOSSIM simulation environment is configured to support bidirectional links between all three nodes. There is no mobility in such evaluation scenario.</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In <a href="#f4">Figure 4</a>, step (1), Node 1&#61630;that models the Mobile Node&#61630;</font><font face="Verdana"><font size="2">performs the key distribution. It accomplishes the sending of MSG1 that is composed of the key identifiers and the XOR operation between these keys stored by the MN, one from Node 2 and another one from Node 3. In steps (2) and (3), sensor nodes receive MSG1 and recover the keys from each other, but in a encrypted way with the information <i>Z</i></font><sub><font size="2"><i>i</i></font></sub><font size="2">. In step (4), all communication between the Nodes 2 and 3 are encrypted. In this step sensors exchange 8-byte MSG2 messages. These messages are logged into message sent and received files. Afterwards, such logs are analyzed. In our implementation, every message is encrypted with the target's key.</font></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">6. </font> </b><font style="font-size: 10pt;" size="3"><b>S</b></font><b><font size="2">IMULATION </font> </b><font style="font-size: 10pt;" size="3"><b>R</b></font><b><font size="2">ESULTS</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">This section presents our evaluation results through simulation. An experimental evaluation was accomplished to measure the processing overhead of both schemes: the one proposed by Kazienko and Albuquerque <a href="#c14">[14]</a> and the one proposed by Oliveira and Barros <a href="#c20">[20]</a>. Our goal is to verify the level of overhead caused by the additional encryption needed to solve the key exposure problem by using the Kazienko and Albuquerque scheme. <a href="#t1">Table 1</a> shows the TOSSIM simulation parameters.</font></p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="t1"></a>Table 1</b>. Simulation parameters.</font></p>              <p style="margin-bottom: 0cm; text-align: center;" lang="en-US"> <font face="Verdana" size="2"> <img src="/img/revistas/cleiej/v14n1/1a09t1.gif">    <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">To start with, it is essential to point out that the comparisons accomplished in this section are based on the three scenarios defined in Subsection 5.2.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In such scenarios, the simulation generates on average 182,000 message transmissions, from those 165,000 messages are received, resulting therefore on average of 10% lost messages. We believe that such loss percentage is due to the interference and collisions that are present in the wireless medium model.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a href="#f5">Figure 5</a> depicts simulation results obtained from 100 simulation runs. In each simulation, the average time required for sending packets in the three scenarios previously described is compared and sorted in decreasing order. Regarding the <i>first scenario</i>, that employs the Kazienko and Albuquerque scheme, such time is given by the sum of the following intervals: sender's encryption delay (decryption of key and encryption of message), transmission delay, propagation delay and receiver's decryption delay (decryption of key and decryption of message). Regarding the <i>second scenario</i> that employs the Oliveira and Barros scheme, there is no decryption of keys in encryption and decryption delays. Regarding the <i>third scenario</i> that does not employ a key distribution scheme, there is no delay related with encryption functions.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     ]]></body>
<body><![CDATA[<br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="border: 0px solid ; width: 565px; height: 349px;" src="/img/revistas/cleiej/v14n1/1a09f5.gif" name="gr&aacute;ficos2"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="f5"></a>Figure 5.</b> This graphic shows the average time for the sending of messages among systems for 100 simulations. Each curve represents the average time spent by each scheme to send all messages. The results are sorted in decreasing order.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>      <font size="2" face="Verdana">Simulation results indicate a very low difference between the scheme proposed by Oliveira and Barros and the scheme introduced by Kazienko and Albuquerque. This difference is in the order of just 250ns on average. This result is shown afterwards in <a href="#f6">Figure 6</a>. </font>     <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Another remark regarding <a href="#f5">Figure 5</a> is that the difference between the largest and the smallest sample with Kazienko and Albuquerque scheme is 34&micro;s. On the other hand, the difference between the largest and the smallest sample of the scheme of Oliveira and Barros is just 27&micro;s. Also, the difference between the largest and the smallest sample provided by the system without cryptography is 24&micro;s. In fact, most of the variation in transmission time is due to the CSMA-based medium access control affecting all evaluated systems, as observed in <a href="#f5">Figure 5</a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a href="#f6">Figure 6</a> shows a data compilation from the 100 simulation runs. This figure presents the average time demanded for the system without cryptography (i), the scheme of Oliveira and Barros <a href="#c20">[20]</a> (ii) and the Kazienko and Albuquerque&rsquo;s scheme (iii) to send messages from Node 2 to Node 3 and vice-versa. We calculated the confidence interval for a 95% confidence level. Error bars are plotted as vertical lines at each point.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">We observe a very low time difference between (ii) and (iii) schemes of just 250 nanoseconds on average. Such value is obtained by the difference between 7.085432ms (from Kazienko and Albuquerque&rsquo;s bar) and 7.085182ms (from the Oliveira and Barros's bar). Also, a very low difference of 1&micro;s is observed between (i) and (iii) approaches obtained by the difference between 7.084357ms (from the without cryptography's bar) and 7.085432ms (from Kazienko and Albuquerque&rsquo;s bar).</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="border: 0px solid ; width: 485px; height: 311px;" src="/img/revistas/cleiej/v14n1/1a09f6.gif" name="gr&aacute;ficos3"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="f6"></a>Figure 6.</b> This graphic depicts a compilation from the 100 simulation runs shown in the <a href="#f5">Figure 5</a> and compares a system without cryptography (i), the Oliveira and Barros scheme (ii) and the Kazienko and Albuquerque scheme (iii). The difference between (ii) and (iii) is very low of just 250ns on average. Also, the difference between (i) and (iii) remains very low in the order of 1&micro;s.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">It is fair to state that Kazienko and Albuquerque scheme introduces processing overhead due to the message encryption algorithms performed by sensors. However, such encryption functions are lightweight, somewhat simple and fast since they consist of XOR operations over bit sequences. We claim such aspect has contributed to a very low processing overhead in the order of nanoseconds on average, as presented in <a href="#f6">Figure 6</a>. The processing overhead reflects on the energy consumption. This factor should be considered in sensor networks due to their major constraints.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Additionally, the processing overhead caused by Kazienko and Albuquerque scheme remains very low even when compared with the system without cryptography. On average, the difference between these two approaches is in the order of 1&micro;s. Thus, we argue the use of this scheme is feasible since its processing overhead is very low and comes with the added benefit of providing security for a sensor application.</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In addition, we carry out measurements in order to verify the processing time required by sensors to perform encryption and decryption functions with their mechanism. The sender sensor has to decrypt the secret <i>Z</i> and encrypt the message. This is the <i>sender processing time</i>. On the other hand, the receiver sensor has to decrypt the secret Z and decrypt the message. Such time is the <i>receiver processing time</i>. For 182,942 samples collected, in both cases, the processing time is zero considering a precision of nanoseconds.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Another important concern in WSNs is power consumption. Therefore, in this simulation experiment, we also carry out measurements with the aim to estimate the usage of energy by the considered approaches.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In order to estimate the total power consumption of the three motes per simulation run, we only consider the sending and receiving events. In our scenario, the power consumption caused by processing is negligible compared to the energy consumption of radio transmission and reception.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">First of all, we need to quantify what is the energy drained by sending and receiving modes. According to the MicaZ architecture data sheet <a href="#c4">[4]</a>, radio reception drains 19.7mA and radio transmission at the highest power available drains 17.4mA. In addition, a regular MicaZ mote is fed by two AA batteries with 1.5V.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a href="#t2">Table 2</a> shows the number of sending and receiving events on average as well as the estimated power consumption per simulation run, considering the three schemes investigated in our study.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="t2"></a>Table 2.</b> Number of events of sending and receiving generated on average per simulation run.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> </p>    <span style="font-family: &quot;Verdana&quot;;"><font size="2"><img src="/img/revistas/cleiej/v14n1/1a09t2.gif"></font></span><font size="2" face="Verdana"> </font>      <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Analyzing the obtained results in <a href="#t2">Table 2</a>, we claim that the Kazienko and Albuquerque scheme is feasible from the power consumption point of view since the estimated power consumption is quite similar in all approaches.</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">7. </font> </b><font style="font-size: 10pt;" size="3"><b>P</b></font><b><font size="2">RACTICAL </font> </b><font style="font-size: 10pt;" size="3"><b>E</b></font><b><font size="2">XPERIMENTS</font></b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Our practical experiments are performed on four off-the-shelf sensors: one TelosB <a href="#c5">[5]</a> and three MicaZ <a href="#c4">[4]</a> motes. In these experiments, only the scheme of Kazienko and Albuquerque is implemented. Different from simulation experiments, the application code is split in order to avoid unnecessary code to be loaded to sensors. The <i>key distribution code</i>, called Code D, is loaded into the TelosB mote and the <i>regular mote code</i>, called Code R, is loaded into all MicaZ motes. We have documented memory size requirements of our D and R codes. The footprint of such codes, considering flash memory and RAM, is shown in <a href="#t3">Table 3</a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="t3"></a>Table 3</b>. Footprint of codes.</font></p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img src="/img/revistas/cleiej/v14n1/1a09t3.gif">    <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">The results presented in <a href="#t3">Table 3</a> confirm that both codes D and R fit well within the flash memory available in TelosB and MicaZ motes. The available memory in such kind of motes is detailed in Subsection 5.1. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In order to perform practical experiments, we built an experimentation scenario. The MicaZ motes are deployed about 15 meters from each other in an indoor environment. Mote 1 is the TelosB distribution node, loaded with code D. This sensor plays the role of MN, as described in Section 2. The other three sensors&#61630;the MicaZ motes&#61630;are loaded with code R. These motes are regular sensors that begin to send and receive encrypted messages only when the key distribution takes place. These sensors are called Motes 2, 3 and 4. In our scenario, between Motes 2 and 3 there is a wall, while between Motes 3 and 4 there are two walls.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Initially, Mote 1 accomplishes the key distribution of K2 &#61637; K3 and K3 &#61637; K4 in sequence, where K2, K3 and K4 are previously known keys from Motes 2, 3 and 4, respectively. We have used the sensors&rsquo; LEDs in order to indicate the success of some tasks. For example, the key distribution messages are sent in an interval of 10 seconds and when it takes place all sensor LEDs toggle. For the regular sensors, we used the orange LED to indicate the sending and the green LED to indicate the receiving of messages. It is important to highlight that the green LED blinks only when a message (previously known to the application) is received and correctly decrypted. <a href="#f7">Figure 7</a> depicts the network behavior when the Mote 1 is placed in the middle of the Motes 2 and 3.</font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="border: 0px solid ; width: 459px; height: 240px;" src="/img/revistas/cleiej/v14n1/1a09f7.gif" name="gr&aacute;ficos4"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font style="font-size: 10pt;" size="2" face="Verdana"><b><a name="f7"></a>Figure 7.</b> This diagram depicts the network situation when Mote 1 is placed in the middle of Mote 2 and Mote 3; and out of the range of Mote 4. Motes 2 and 3 receive the XOR transmission and recover the keys from each other. Just at this moment, they begin to exchange messages between themselves. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In <a href="#f7">Figure 7</a>, step (1), the key distribution transmission of K2 &#61637; K3 is accomplished. In a similar way, in step (2), it is accomplished the transmission of K3 &#61637; K4. Steps (1) and (2) take place in sequence with the periodicity of 10 seconds, as mentioned. In step (3), Motes 2 and 3 receive such transmissions and recover the keys. Motes 2 and 3 recover the keys from each other and then they start to exchange encrypted messages. Moreover, although Mote 4 is out of the range of Mote 1, Mote 3 received the transmission of K3 &#61637; K4 and recovered the key of Mote 4. Thus, in the step (4), the Mote 3 sends encrypted messages to Mote 4. In this experiment, we have defined that the messages are encrypted with the target&rsquo;s key. <a href="#f8">Figure 8</a> depicts the mobility of Mote 1 towards the range of Motes 3 and 4.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     ]]></body>
<body><![CDATA[<br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2"> <img style="border: 0px solid ; width: 482px; height: 240px;" src="/img/revistas/cleiej/v14n1/1a09f8.gif" name="gr&aacute;ficos5"></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana"> <a name="f8"><font size="2"></font></a><font style="font-size: 10pt;" size="2"><b>Figure 8.</b> This diagram depicts the network situation when Mote 1 is placed in the middle of Mote 3 and Mote 4; and out of the range of Mote 2. Motes 3 and 4 receive the XOR transmission and recover the keys. After that, Mote 4 is able to recover the key of Mote 3 and then to send encrypted messages to this mote.</font></font></p>          <p style="margin-bottom: 0cm;" align="center" lang="en-US"> <font face="Verdana" size="2">     <br>      </font>      </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">In <a href="#f8">Figure 8</a>, step (5), the same key distribution messages are transmitted, as explained in the steps (1) and (2) from <a href="#f7">Figure 7</a>. However, the MN is carried to the range of Motes 3 and 4; and out of the range of Mote 2. Since Mote 4 receives the transmission of K3 &#61637; K4, it can recover the key of Mote 3 and starts sending encrypted messages to this mote, as it is possible to see in the step (6).</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">After the mobility of the Node 1 presented in <a href="#f7">Figures 7</a> and <a href="#f8">8</a>, the orange and the green lights of all Motes 2, 3 and 4 remained blinking throughout the duration of the experiment. Such result indicated the messages kept being encrypted and decrypted correctly. This validates the functionality of the scheme and its feasibility to run on real sensor platforms.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <b><font size="2">8. </font> </b><font style="font-size: 10pt;" size="3"><b>C</b></font><b><font size="2">ONCLUSION AND </font> </b><font style="font-size: 10pt;" size="3"><b>F</b></font><b><font size="2">UTURE </font> </b><font style="font-size: 10pt;" size="3"><b>W</b></font><b><font size="2">ORKS</font></b></font></p>          ]]></body>
<body><![CDATA[<p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Currently, experimental evaluation in wireless sensor networks is broadly supported by TinyOS. In this work, we argue in favor of the practical feasibility of implementing the scheme proposed by Kazienko and Albuquerque using TinyOS. </font> </p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Simulation results reveal a low and negligible processing overhead when compared to existing approaches. Additionally, the power consumption observed is quite similar among all approaches. Moreover, our experimental evaluation was composed of practical experiments. Two classes of the application were developed: the key distribution code and the regular mote code. In both cases, the applications fit well within the TelosB and MicaZ sensors memory size. Furthermore, when such codes were loaded into such sensors, we observed that the pairwise key distribution and the encrypted message exchanging were being successfully accomplished.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">Even though our implementation does not fully model the original scheme in which the information <i>Z</i> is protected in a cryptographic module area, we claim that such hardware implementation would make the encryption and decryption of keys even faster.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">For future works, we intend to extend and pursue additional practical experiments. First, we intend to increase the number of sensors in order to extend our evaluation regarding scalability. Second, we wish to implement and evaluate the feasibility of an authentication protocol, as proposed by Kazienko and Albuquerque <a href="#c14">[14]</a>.</font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>Acknowledgments</b></font></p>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana">This research effort is financed by Capes, CNPq and Faperj.</font></p>      <font face="Verdana" size="2">          <br>      </font>          <p style="margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><b>References</b></font></p>          <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c1"></a>[<a href="#c1.">1</a>] AKYILDIZ, I. F.; SU, W.; SANKARASUBRAMANIAM, Y.; CAYIRCI, E. Wireless Sensor Netwoks: a Survey. <i>Computer Networks</i>. 38(4):393-422, 2002.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c2"></a>[<a href="#c2.">2</a>] BECHER, A; BENENSON, Z.; DORNSEIF, M. Tampering with Motes: Real-tampering Physical Attacks on Wireless Sensor Networks. In: <i>3rd International Conference on Security in Pervasive Computing (SPC)</i>, p.1-15, 2006.</font></p>        ]]></body>
<body><![CDATA[<p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c3"></a>[<a href="#c3.">3</a>] BIRYUKOV, A.; KHOVRATOVICH, D. Related-key Cryptanalysis of the full AES-192 and AES-256. <i>Cryptology ePrint Archive, Rep.2009/317</i>. &lt;http://eprint.iacr.org/&gt;, 2009.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" lang="en-US"> <font size="2" face="Verdana"><a name="c4"></a>[<a href="#c4.">4</a>] CROSSBOW. <i>MicaZ datasheet</i>. Available in: <a href="http://www.xbow.com">&lt;http://www.xbow.com&gt;</a>, accessed in: Sept. 2010.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" lang="en-US"> <font size="2" face="Verdana"><a name="c5"></a>[<a href="#c5.">5</a>] CROSSBOW. <i>TelosB datasheet</i>. Available in: <a href="http://www.xbow.com">&lt;http://www.xbow.com&gt;</a>;, accessed in: Oct. 2010.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font face="Verdana"> <font style="font-size: 10pt;" size="2"><a name="c6"></a>[</font><font size="2"><a href="#c6.">6</a>] CULLER, D., ESTRIN, D., SRIVASTAVA, M. Overview of Sensor Networks. <i>IEEE Computer Magazine</i>. 37(8):41-49, 2004.</font></font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c7"></a>[<a href="#c7.">7</a>] EREN, H.; SANDOR, L. Fringe-effect Capacitive Proximity Sensors for Tamper Proof Enclosures. In: <i>IEEE Sensors for Industry Conference (SIcon'05)</i>, p.22-26, 2005.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c8"></a>[<a href="#c8.">8]</a> ESCHENAUER, L.; GLIGOR, V. D. A Key-management Scheme for Distributed Sensor Networks. In: <i>9th ACM Conference on Computer and Communications Security</i>, p.41-47, 2002.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c9"></a>[<a href="#c9.">9</a>] FRAGOULI, C.; BOUDEC, J.-Y. L.; WIDMER, J. Network Coding: An Instant Primer. <i>ACM SIGCOMM Computer Communication Review</i>, 36(1):63-68, 2006.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c10"></a>[<a href="#c10.">10</a>] GAY, D.; LEVIS, P.; BEHREN, R. Von; WELSH, M.; BREWER, E.; CULLER, D. The nesC Language: A Holistic Approach to Networked Embedded Systems. In: <i>PLDI &rsquo;03: Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation</i>. New York: ACM, 2003, pp.1&ndash;11.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c11"></a>[<a href="#c11.">11</a>] HU, F.; SHARMA, N. K. Security Considerations in Ad Hoc Sensor Networks. <i>Ad Hoc Networks</i>, vol. 3, no. 1, pp. 69&ndash;89, Jan. 2005.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c12"></a>[<a href="#c12.">12]</a> I-NRG. <i>Inter-networking research group</i>. Available in: <a href="http://inrg.cse.ucsc.edu">&lt;http://inrg.cse.ucsc.edu&gt;</a>, accessed in: Sept. 2010.</font></p>        ]]></body>
<body><![CDATA[<p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c13"></a>[<a href="#c13.">13</a>] KATTI, S.; RAHUL, H.; HU, W.; KATABI, D.; M&Eacute;DARD, M.; CROWCROFT, J. XORs in the Air: Practical Wireless Network Coding. <i>IEEE/ACM Transactions on Networking</i>, 16(3):497-510, 2008.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><span lang="pt-BR"><a name="c14"></a>[<a href="#c14.">14]</a> KAZIENKO, J. F.; ALBUQUERQUE, C. V. N. Autentica&ccedil;&atilde;o, Distribui&ccedil;&atilde;o de Chaves e Armazenamento Seguro em Redes de Sensores Sem Fio. In: <i>XXXVI Confer&ecirc;ncia Latino-americana de Inform&aacute;tica (CLEI2010)</i>, Asunci&oacute;n, Paraguay, 2010, pp.1-14.</span></font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c15"></a>[<a href="#c15.">15</a>] KAZIENKO, J. F.; ALBUQUERQUE, C. V. N. Secure Secret Key Distribution and Storage in Wireless Sensor Networks. In: <i>Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications, in Conjunction with 10th IEEE International Conference on Computer and Information Technology (TSP/CIT'10)</i>. Bradford, UK: IEEE Computer Society, 2010, pp.890-895.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c16"></a>[<a href="#c16.">16</a>] LEVIS, P.; LEE, N.; WELSH, M.; CULLER, D. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In: <i>Proceedings of the 1st International Conference on Embedded Networked Sensor Systems</i>, 2003, pp.126-137.</font></p>         <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c17"></a>[<a href="#c17.">17</a>] LEVIS, P.; MADDEN, S.; POLASTRE, J.; SZEWCZYK, R.; WHITEHOUSE, K.; WOO, A.; GAY, D.; HILL, J.; WELSH, M.; BREWER, E.; CULLER, D. TinyOS: An Operating System for Sensor Networks. <i>TinyOS Team</i>. Springer-Verlag, 2004.</font></p>         <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c18"></a>[<a href="#c18.">18</a>] LIM, D.; LEE, J. W.; GASSEND, B.; SUH, G. E.; DIJK, M. V.; DEVADAS, S. Extracting Secret Keys from Integrated Circuits<i>. IEEE Transactions on Very Large Scale Integration (VLSI) Systems</i>, 13(10):1200-1205, 2005.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c19"></a>[<a href="#c19.">19]</a> MARTINA, J. E.; DE SOUZA, T. C. S.; CUST&Oacute;DIO, R. F. OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules. In: <i>European PKI Workshop: Theory and Practice (EuroPKI'07)</i>, pp.220-235, 2007.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c20"></a><a href="#c20.">[20</a>] OLIVEIRA, P. F.; BARROS, J. A Network Coding Approach to Secret Key Distribution. <i>IEEE Transactions on Information Forensics and Security</i>, 3(3):414-423, 2008.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c21"></a>[<a href="#c21.">21</a>] WANG, H.; LI, Q. Efficient Implementation of Public Key Cryptosystems in MICAz and TelosB motes. <i>College of William and Mary, Tech. Rep. WM-CS-2006-07</i>, Oct., 2006.</font></p>        <p style="margin-left: 0.8cm; text-indent: -0.8cm; margin-bottom: 0cm;" align="justify" lang="en-US"> <font size="2" face="Verdana"><a name="c22"></a>[<a href="#c22.">22</a>] ZHOU, Y.; FANG, Y.; ZHANG, Y. Securing Wireless Sensor Networks: a Survey. <i>IEEE Communications Surveys and Tutorials</i>, 10(3):6-28, 2008.</font></p>         ]]></body>
<body><![CDATA[ ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[AKYILDIZ]]></surname>
<given-names><![CDATA[I. F.]]></given-names>
</name>
<name>
<surname><![CDATA[SU]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[SANKARASUBRAMANIAM]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[CAYIRCI]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Wireless Sensor Netwoks: a Survey]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2002</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>393-422</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BECHER]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[BENENSON]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[DORNSEIF]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Tampering with Motes: Real-tampering Physical Attacks on Wireless Sensor Networks]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ 3rd International Conference on Security in Pervasive Computing (SPC)]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BIRYUKOV]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[KHOVRATOVICH]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Related-key Cryptanalysis of the full AES-192 and AES-256]]></source>
<year>2009</year>
<publisher-name><![CDATA[Cryptology ePrint Archive]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[CROSSBOW]]></surname>
</name>
</person-group>
<source><![CDATA[MicaZ datasheet]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[CROSSBOW]]></surname>
</name>
</person-group>
<source><![CDATA[TelosB datasheet]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[CULLER]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[ESTRIN]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[SRIVASTAVA]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Overview of Sensor Networks]]></article-title>
<source><![CDATA[IEEE Computer Magazine]]></source>
<year>2004</year>
<volume>37</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>41-49</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[EREN]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[SANDOR]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Fringe-effect Capacitive Proximity Sensors for Tamper Proof Enclosures]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ IEEE Sensors for Industry Conference (SIcon'05)]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ESCHENAUER]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[GLIGOR]]></surname>
<given-names><![CDATA[V. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Key-management Scheme for Distributed Sensor Networks]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ 9th ACM Conference on Computer and Communications Security]]></conf-name>
<conf-date>2002</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[FRAGOULI]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[BOUDEC]]></surname>
<given-names><![CDATA[J.-Y. L.]]></given-names>
</name>
<name>
<surname><![CDATA[WIDMER]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Network Coding: An Instant Primer]]></article-title>
<source><![CDATA[ACM SIGCOMM Computer Communication Review]]></source>
<year>2006</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>63-68</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[GAY]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[LEVIS]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[BEHREN]]></surname>
<given-names><![CDATA[R. Von]]></given-names>
</name>
<name>
<surname><![CDATA[WELSH]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[BREWER]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[CULLER]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The nesC Language: A Holistic Approach to Networked Embedded Systems]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ PLDI ’03: Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation.]]></conf-name>
<conf-date>2003</conf-date>
<conf-loc>New York </conf-loc>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[HU]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[SHARMA]]></surname>
<given-names><![CDATA[N. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Security Considerations in Ad Hoc Sensor Networks]]></article-title>
<source><![CDATA[Ad Hoc Networks]]></source>
<year>Jan.</year>
<month> 2</month>
<day>00</day>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>69-89</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<collab>I-NRG</collab>
<source><![CDATA[Inter-networking research group]]></source>
<year>acce</year>
<month>ss</month>
<day>ed</day>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[KATTI]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[RAHUL]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[HU]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[KATABI]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[MÉDARD]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[CROWCROFT]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[XORs in the Air: Practical Wireless Network Coding]]></article-title>
<source><![CDATA[IEEE/ACM Transactions on Networking]]></source>
<year>2008</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>497-510</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[KAZIENKO]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[ALBUQUERQUE]]></surname>
<given-names><![CDATA[C. V. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="pt"><![CDATA[Autenticação, Distribuição de Chaves e Armazenamento Seguro em Redes de Sensores Sem Fio]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ XXXVI Conferência Latino-americana de Informática (CLEI2010)]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Asunción </conf-loc>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[KAZIENKO]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[ALBUQUERQUE]]></surname>
<given-names><![CDATA[C. V. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Secure Secret Key Distribution and Storage in Wireless Sensor Networks]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications, in Conjunction with 10th IEEE International Conference on Computer and Information Technology (TSP/CIT'10)]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Bradford </conf-loc>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LEVIS]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[LEE]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[WELSH]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[CULLER]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Proceedings of the 1st International Conference on Embedded Networked Sensor Systems]]></conf-name>
<conf-date>2003</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LEVIS]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[MADDEN]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[POLASTRE]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[SZEWCZYK]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[WHITEHOUSE]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[WOO]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[GAY]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[HILL]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[WELSH]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[BREWER]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[CULLER]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[TinyOS: An Operating System for Sensor Networks]]></source>
<year>2004</year>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LIM]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[LEE]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[GASSEND]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[SUH]]></surname>
<given-names><![CDATA[G. E.]]></given-names>
</name>
<name>
<surname><![CDATA[DIJK]]></surname>
<given-names><![CDATA[M. V.]]></given-names>
</name>
<name>
<surname><![CDATA[DEVADAS]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Extracting Secret Keys from Integrated Circuits]]></article-title>
<source><![CDATA[IEEE Transactions on Very Large Scale Integration (VLSI) Systems]]></source>
<year>2005</year>
<volume>13</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1200-1205</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MARTINA]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[DE SOUZA]]></surname>
<given-names><![CDATA[T. C. S.]]></given-names>
</name>
<name>
<surname><![CDATA[CUSTÓDIO]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ European PKI Workshop: Theory and Practice (EuroPKI'07)]]></conf-name>
<conf-date>2007</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[OLIVEIRA]]></surname>
<given-names><![CDATA[P. F.]]></given-names>
</name>
<name>
<surname><![CDATA[BARROS]]></surname>
<given-names><![CDATA[J. A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Network Coding Approach to Secret Key Distribution]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2008</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>414-423</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[WANG]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[LI]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient Implementation of Public Key Cryptosystems in MICAz and TelosB motes]]></source>
<year>Oct.</year>
<month>, </month>
<day>20</day>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ZHOU]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[FANG]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[ZHANG]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Securing Wireless Sensor Networks: a Survey]]></article-title>
<source><![CDATA[IEEE Communications Surveys and Tutorials]]></source>
<year>2008</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>6-28</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
