Leonardo Oliveira - Academia.edu (original) (raw)

Papers by Leonardo Oliveira

Research paper thumbnail of SOS: Secure Overlay Sensornets

Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007

Research paper thumbnail of SecLEACH - On the security of clustered sensor networks

Signal Processing, 2007

Clustered sensor networks have recently been shown to increase system throughput, decrease system... more Clustered sensor networks have recently been shown to increase system throughput, decrease system delay, and save energy while performing data aggregation. Whereas those with rotating cluster heads, such as LEACH (low-energy adaptive clustering hierarchy), have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we investigate the problem of adding security to hierarchical (cluster-based) sensor networks where clusters are formed dynamically and periodically, such as LEACH. For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and μTESLAμTESLA, a building block from SPINS, can be both used to secure communications in this type of network. We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency. To the best of our knowledge, ours is the first that investigates security in hierarchical WSNs with dynamic cluster formation.

Research paper thumbnail of On the design of secure protocols for hierarchical sensor networks

International Journal of Security and Networks, 2007

Research paper thumbnail of On the performance of ad hoc routing protocols under a peer-to-peer application

Journal of Parallel and Distributed Computing, 2005

Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies bas... more Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infra-structure and the demand for applications that share files or distribute processing through the Internet, MANETs and P2P applications have received some interest from research community. As a characteristic of the distributed model, which they follow, such technologies face a difficult task of routing requests in a decentralized environment. In this paper, we conducted a detailed study of a Gnutella-like application running over a MANET where three different protocols were considered. The results show that each protocol that were analyzed performed well in under some conditions and for some metrics, while had drawbacks in others.

Research paper thumbnail of LHA-SP: secure protocols for hierarchical wireless sensor networks

Integrated Network Management, 2005

Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with l... more Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.

Research paper thumbnail of SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks

Network Computing and Applications, 2006

Clustered sensor networks have been shown to increase system throughput, decrease system delay, a... more Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs

Research paper thumbnail of Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks

Workshop on Wireless Mobile Multimedia, 2005

Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-o... more Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-organizing networks with dynamic topology and are responsible for routing queries in a distributed environment. Because MANETs are composed of resource-constrained devices susceptible to faults, whereas P2P networks are fault-tolerant, P2P networks are the ideal data sharing system for MANETs. We have conducted an evaluation of two approaches for P2P content discovery running over a MANET. The first, based on unstructured P2P networks, relies on controlled flooding, while the second, based on structured P2P networks, uses distributed indexing to optimize searches. We use simulations to evaluate the effect of network size, mobility, channel error rates, network workload, and application dynamics in the performance of P2P protocols over MANETs. Results show that unstructured protocols are the most resilient, although at higher energy and delay costs. Structured protocols, conversely, consume less energy and are more appropriate for MANETs where topology is mostly static.

Research paper thumbnail of Identity-Based Encryption for Sensor Networks

IEEE International Conference on Pervasive Computing and Communications, 2007

... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ..... more ... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ... usingkey k enck() : Encryption computed using key k m : Message information ⇒, →: Broadcast and unicast ... In the context of WSNs, recall from Section 3 that we envision that nodes will use ...

Research paper thumbnail of TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Computer Communications, 2008

Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using pairing-based cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identity based non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is able to compute pairings in about 5.5s on an ATmega128L clocked at 7.3828-MHz (the MICA2 and MICAZ node microcontroller).

Research paper thumbnail of Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks

Computer Communications, 2009

Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-pee... more Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-peer (P2P) networks due to its increased resiliency and efficiency when compared to client–server approaches. P2P networks are usually divided into two types, structured and unstructured, based on their content discovery strategy. Unstructured networks use controlled flooding, while structured networks use distributed indexes. This article evaluates the performance of these two approaches over MANETs and proposes modifications to improve their performance. Results show that unstructured protocols are extremely resilient, however they are not scalable and present high energy consumption and delay. Structured protocols are more energy-efficient, however they have a poor performance in dynamic environments due to the frequent loss of query messages. Based on those observations, we employ selective forwarding to decrease the bandwidth consumption in unstructured networks, and introduce redundant query messages in structured P2P networks to increase their success ratio.

Research paper thumbnail of TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes

Network Computing and Applications, 2007

After a few years of intense research, wireless sensor networks (WSNs) still demand new secure an... more After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.

Research paper thumbnail of Fault management in event-driven wireless sensor networks

International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Research paper thumbnail of On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks

International Conference on Networking, 2005

Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited ... more Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster-based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original LEACH.

Research paper thumbnail of NanoECC: Testing the limits of elliptic curve cryptography in sensor networks

Wireless sensor networks, 2008

Research paper thumbnail of Efficient implementation of elliptic curve cryptography in wireless sensors

Advances in Mathematics of Communications, 2010

Research paper thumbnail of TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Computer Communications, 2011

Research paper thumbnail of SOS: Secure Overlay Sensornets

Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007

Research paper thumbnail of SecLEACH - On the security of clustered sensor networks

Signal Processing, 2007

Clustered sensor networks have recently been shown to increase system throughput, decrease system... more Clustered sensor networks have recently been shown to increase system throughput, decrease system delay, and save energy while performing data aggregation. Whereas those with rotating cluster heads, such as LEACH (low-energy adaptive clustering hierarchy), have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we investigate the problem of adding security to hierarchical (cluster-based) sensor networks where clusters are formed dynamically and periodically, such as LEACH. For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and μTESLAμTESLA, a building block from SPINS, can be both used to secure communications in this type of network. We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency. To the best of our knowledge, ours is the first that investigates security in hierarchical WSNs with dynamic cluster formation.

Research paper thumbnail of On the design of secure protocols for hierarchical sensor networks

International Journal of Security and Networks, 2007

Research paper thumbnail of On the performance of ad hoc routing protocols under a peer-to-peer application

Journal of Parallel and Distributed Computing, 2005

Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies bas... more Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infra-structure and the demand for applications that share files or distribute processing through the Internet, MANETs and P2P applications have received some interest from research community. As a characteristic of the distributed model, which they follow, such technologies face a difficult task of routing requests in a decentralized environment. In this paper, we conducted a detailed study of a Gnutella-like application running over a MANET where three different protocols were considered. The results show that each protocol that were analyzed performed well in under some conditions and for some metrics, while had drawbacks in others.

Research paper thumbnail of LHA-SP: secure protocols for hierarchical wireless sensor networks

Integrated Network Management, 2005

Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with l... more Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.

Research paper thumbnail of SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks

Network Computing and Applications, 2006

Clustered sensor networks have been shown to increase system throughput, decrease system delay, a... more Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs

Research paper thumbnail of Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks

Workshop on Wireless Mobile Multimedia, 2005

Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-o... more Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-organizing networks with dynamic topology and are responsible for routing queries in a distributed environment. Because MANETs are composed of resource-constrained devices susceptible to faults, whereas P2P networks are fault-tolerant, P2P networks are the ideal data sharing system for MANETs. We have conducted an evaluation of two approaches for P2P content discovery running over a MANET. The first, based on unstructured P2P networks, relies on controlled flooding, while the second, based on structured P2P networks, uses distributed indexing to optimize searches. We use simulations to evaluate the effect of network size, mobility, channel error rates, network workload, and application dynamics in the performance of P2P protocols over MANETs. Results show that unstructured protocols are the most resilient, although at higher energy and delay costs. Structured protocols, conversely, consume less energy and are more appropriate for MANETs where topology is mostly static.

Research paper thumbnail of Identity-Based Encryption for Sensor Networks

IEEE International Conference on Pervasive Computing and Communications, 2007

... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ..... more ... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ... usingkey k enck() : Encryption computed using key k m : Message information ⇒, →: Broadcast and unicast ... In the context of WSNs, recall from Section 3 that we envision that nodes will use ...

Research paper thumbnail of TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Computer Communications, 2008

Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using pairing-based cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identity based non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is able to compute pairings in about 5.5s on an ATmega128L clocked at 7.3828-MHz (the MICA2 and MICAZ node microcontroller).

Research paper thumbnail of Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks

Computer Communications, 2009

Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-pee... more Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-peer (P2P) networks due to its increased resiliency and efficiency when compared to client–server approaches. P2P networks are usually divided into two types, structured and unstructured, based on their content discovery strategy. Unstructured networks use controlled flooding, while structured networks use distributed indexes. This article evaluates the performance of these two approaches over MANETs and proposes modifications to improve their performance. Results show that unstructured protocols are extremely resilient, however they are not scalable and present high energy consumption and delay. Structured protocols are more energy-efficient, however they have a poor performance in dynamic environments due to the frequent loss of query messages. Based on those observations, we employ selective forwarding to decrease the bandwidth consumption in unstructured networks, and introduce redundant query messages in structured P2P networks to increase their success ratio.

Research paper thumbnail of TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes

Network Computing and Applications, 2007

After a few years of intense research, wireless sensor networks (WSNs) still demand new secure an... more After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.

Research paper thumbnail of Fault management in event-driven wireless sensor networks

International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

Research paper thumbnail of On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks

International Conference on Networking, 2005

Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited ... more Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster-based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original LEACH.

Research paper thumbnail of NanoECC: Testing the limits of elliptic curve cryptography in sensor networks

Wireless sensor networks, 2008

Research paper thumbnail of Efficient implementation of elliptic curve cryptography in wireless sensors

Advances in Mathematics of Communications, 2010

Research paper thumbnail of TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Computer Communications, 2011