Leonardo Oliveira - Profile on Academia.edu (original) (raw)
Papers by Leonardo Oliveira
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of mo... more Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sensornets are ad hoc networks comprised mainly of small sensor nodes with extremely limited resources which can be used to monitor areas of interest. In this paper, we present Secure Overlay Sensornets (SOS). SOS builds an ON over a sensornet, and it establishes and monitors alternative overlay routes. By doing so, SOS is able to find out routes more secure than routes provided by the default routing protocol. Our results indicate that SOS improves the delivery ratio in scenarios under DoS attacks and that it is efficient in terms of energy consumption. To our knowledge, SOS is the first security mechanism based on ONs for sensornets.
Signal Processing, 2007
Clustered sensor networks have recently been shown to increase system throughput, decrease system... more Clustered sensor networks have recently been shown to increase system throughput, decrease system delay, and save energy while performing data aggregation. Whereas those with rotating cluster heads, such as LEACH (low-energy adaptive clustering hierarchy), have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we investigate the problem of adding security to hierarchical (cluster-based) sensor networks where clusters are formed dynamically and periodically, such as LEACH. For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and μTESLAμTESLA, a building block from SPINS, can be both used to secure communications in this type of network. We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency. To the best of our knowledge, ours is the first that investigates security in hierarchical WSNs with dynamic cluster formation.
International Journal of Security and Networks, 2007
AbstractWireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor node... more AbstractWireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.
Journal of Parallel and Distributed Computing, 2005
Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies bas... more Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infra-structure and the demand for applications that share files or distribute processing through the Internet, MANETs and P2P applications have received some interest from research community. As a characteristic of the distributed model, which they follow, such technologies face a difficult task of routing requests in a decentralized environment. In this paper, we conducted a detailed study of a Gnutella-like application running over a MANET where three different protocols were considered. The results show that each protocol that were analyzed performed well in under some conditions and for some metrics, while had drawbacks in others.
Integrated Network Management, 2005
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with l... more Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.
Network Computing and Applications, 2006
Clustered sensor networks have been shown to increase system throughput, decrease system delay, a... more Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs
Workshop on Wireless Mobile Multimedia, 2005
Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-o... more Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-organizing networks with dynamic topology and are responsible for routing queries in a distributed environment. Because MANETs are composed of resource-constrained devices susceptible to faults, whereas P2P networks are fault-tolerant, P2P networks are the ideal data sharing system for MANETs. We have conducted an evaluation of two approaches for P2P content discovery running over a MANET. The first, based on unstructured P2P networks, relies on controlled flooding, while the second, based on structured P2P networks, uses distributed indexing to optimize searches. We use simulations to evaluate the effect of network size, mobility, channel error rates, network workload, and application dynamics in the performance of P2P protocols over MANETs. Results show that unstructured protocols are the most resilient, although at higher energy and delay costs. Structured protocols, conversely, consume less energy and are more appropriate for MANETs where topology is mostly static.
Identity-Based Encryption for Sensor Networks
IEEE International Conference on Pervasive Computing and Communications, 2007
... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ..... more ... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ... usingkey k enck() : Encryption computed using key k m : Message information ⇒, →: Broadcast and unicast ... In the context of WSNs, recall from Section 3 that we envision that nodes will use ...
Computer Communications, 2008
Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using pairing-based cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identity based non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is able to compute pairings in about 5.5s on an ATmega128L clocked at 7.3828-MHz (the MICA2 and MICAZ node microcontroller).
Computer Communications, 2009
Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-pee... more Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-peer (P2P) networks due to its increased resiliency and efficiency when compared to client–server approaches. P2P networks are usually divided into two types, structured and unstructured, based on their content discovery strategy. Unstructured networks use controlled flooding, while structured networks use distributed indexes. This article evaluates the performance of these two approaches over MANETs and proposes modifications to improve their performance. Results show that unstructured protocols are extremely resilient, however they are not scalable and present high energy consumption and delay. Structured protocols are more energy-efficient, however they have a poor performance in dynamic environments due to the frequent loss of query messages. Based on those observations, we employ selective forwarding to decrease the bandwidth consumption in unstructured networks, and introduce redundant query messages in structured P2P networks to increase their success ratio.
Network Computing and Applications, 2007
After a few years of intense research, wireless sensor networks (WSNs) still demand new secure an... more After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.
International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004
Wireless Sensor Networks (WSNs) have emerged as a new monitoring and control solution for a varie... more Wireless Sensor Networks (WSNs) have emerged as a new monitoring and control solution for a variety of applications. Although the behavior of a WSN is characterized by the type of its application, a common element exist: faults are a normal fact, not isolated events as in traditional networks. Thus, in order to guarantee the network quality of service it is essential for the WSN to be able to detect failures and perform something akin to healing, recovering from events that might cause some of its parts to malfunction. In this work we propose and evaluate a failure detection scheme using a management architecture for WSNs, called MANNA. We take a deep look at its fault management capabilities supposing the existence of an event-driven WSN. This is a challenging and attractive kind of WSN and we show how the use of automatic management services defined by MANNA can provide self-configuration, self-diagnostic, and self-healing (some of the self-managing capabilities). We also show that the management solution promote the resources productivity without incurring a high cost to the network.
International Conference on Networking, 2005
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited ... more Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster-based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original LEACH.
Wireless sensor networks, 2008
By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptograp... more By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility, however, does not necessarily mean attractiveness, as the obtained results are still not satisfactory enough. In this paper, we present results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes. By doing that, we show that PKC is not only viable, but in fact attractive for WSNs. As far as we know pairing computations presented in this paper are the most efficient results on the MICA2 (8-bit/7.3828-MHz ATmega128L) and Tmote Sky nodes.
Advances in Mathematics of Communications, 2010
. A simple elliptic curve
Computer Communications, 2011
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using Pairing-based Cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identitybased non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is an open source code able to compute pairings as well as binary multiplication in about 5.5s and 4019.46µs, respectively, on the ATmega128L 7.3828-MHz/4KB SRAM/128KB ROM processor -the MICA2 and MICAZ node processor.
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007
Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of mo... more Overlay Networks (ONs) are logical networks built on top of a physical network with the aim of moving part of the routing complexity to the application layer. At the same time, sensornets are ad hoc networks comprised mainly of small sensor nodes with extremely limited resources which can be used to monitor areas of interest. In this paper, we present Secure Overlay Sensornets (SOS). SOS builds an ON over a sensornet, and it establishes and monitors alternative overlay routes. By doing so, SOS is able to find out routes more secure than routes provided by the default routing protocol. Our results indicate that SOS improves the delivery ratio in scenarios under DoS attacks and that it is efficient in terms of energy consumption. To our knowledge, SOS is the first security mechanism based on ONs for sensornets.
Signal Processing, 2007
Clustered sensor networks have recently been shown to increase system throughput, decrease system... more Clustered sensor networks have recently been shown to increase system throughput, decrease system delay, and save energy while performing data aggregation. Whereas those with rotating cluster heads, such as LEACH (low-energy adaptive clustering hierarchy), have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we investigate the problem of adding security to hierarchical (cluster-based) sensor networks where clusters are formed dynamically and periodically, such as LEACH. For this purpose, we show how random key predistribution, widely studied in the context of flat networks, and μTESLAμTESLA, a building block from SPINS, can be both used to secure communications in this type of network. We present our solution, and provide a detailed analysis of how different values for the various parameters in such a system impact a hierarchical network in terms of security and energy efficiency. To the best of our knowledge, ours is the first that investigates security in hierarchical WSNs with dynamic cluster formation.
International Journal of Security and Networks, 2007
AbstractWireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor node... more AbstractWireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.
Journal of Parallel and Distributed Computing, 2005
Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies bas... more Mobile ad hoc networks (MANETs) and peer-to-peer (P2P) applications are emerging technologies based on the same paradigm: the P2P paradigm. Motivated, respectively, by the necessity of executing applications in environments with no previous infra-structure and the demand for applications that share files or distribute processing through the Internet, MANETs and P2P applications have received some interest from research community. As a characteristic of the distributed model, which they follow, such technologies face a difficult task of routing requests in a decentralized environment. In this paper, we conducted a detailed study of a Gnutella-like application running over a MANET where three different protocols were considered. The results show that each protocol that were analyzed performed well in under some conditions and for some metrics, while had drawbacks in others.
Integrated Network Management, 2005
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with l... more Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we propose a solution for securing heterogeneous hierarchical WSNs with an arbitrary number of levels. Our solution relies exclusively on symmetric key schemes, is highly distributed, and takes into account node interaction patterns that are specific to clustered WSNs.
Network Computing and Applications, 2006
Clustered sensor networks have been shown to increase system throughput, decrease system delay, a... more Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of their communication makes most existing security solutions inadequate for them. In this paper, we show how random key predistribution, widely studied in the context of flat networks, can be used to secure communication in hierarchical (cluster-based) protocols such as LEACH. To our knowledge, it is the first work that investigates random key predistribution as applied to hierarchical WSNs
Workshop on Wireless Mobile Multimedia, 2005
Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-o... more Both mobile ad hoc networks (MANETs) and peer-to-peer (P2P) networks are decentralized and self-organizing networks with dynamic topology and are responsible for routing queries in a distributed environment. Because MANETs are composed of resource-constrained devices susceptible to faults, whereas P2P networks are fault-tolerant, P2P networks are the ideal data sharing system for MANETs. We have conducted an evaluation of two approaches for P2P content discovery running over a MANET. The first, based on unstructured P2P networks, relies on controlled flooding, while the second, based on structured P2P networks, uses distributed indexing to optimize searches. We use simulations to evaluate the effect of network size, mobility, channel error rates, network workload, and application dynamics in the performance of P2P protocols over MANETs. Results show that unstructured protocols are the most resilient, although at higher energy and delay costs. Structured protocols, conversely, consume less energy and are more appropriate for MANETs where topology is mostly static.
Identity-Based Encryption for Sensor Networks
IEEE International Conference on Pervasive Computing and Communications, 2007
... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ..... more ... idA, encPA (idM | idA | kM,A) N → B : idB, encPB (idN | idB | kN,B) ... Secure exchange of ... usingkey k enck() : Encryption computed using key k m : Message information ⇒, →: Broadcast and unicast ... In the context of WSNs, recall from Section 3 that we envision that nodes will use ...
Computer Communications, 2008
Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using pairing-based cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identity based non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is able to compute pairings in about 5.5s on an ATmega128L clocked at 7.3828-MHz (the MICA2 and MICAZ node microcontroller).
Computer Communications, 2009
Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-pee... more Content dissemination over mobile ad hoc networks (MANETs) is usually performed using peer-to-peer (P2P) networks due to its increased resiliency and efficiency when compared to client–server approaches. P2P networks are usually divided into two types, structured and unstructured, based on their content discovery strategy. Unstructured networks use controlled flooding, while structured networks use distributed indexes. This article evaluates the performance of these two approaches over MANETs and proposes modifications to improve their performance. Results show that unstructured protocols are extremely resilient, however they are not scalable and present high energy consumption and delay. Structured protocols are more energy-efficient, however they have a poor performance in dynamic environments due to the frequent loss of query messages. Based on those observations, we employ selective forwarding to decrease the bandwidth consumption in unstructured networks, and introduce redundant query messages in structured P2P networks to increase their success ratio.
Network Computing and Applications, 2007
After a few years of intense research, wireless sensor networks (WSNs) still demand new secure an... more After a few years of intense research, wireless sensor networks (WSNs) still demand new secure and cryptographic schemes. On the other hand, the advent of cryptography from pairings has enabled a wide range of novel cryptosystems. In this work we present TinyTate, the first known implementation of pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA2 and MICAz motes). We then conclude that cryptography from pairings is indeed viable in resource-constrained nodes.
International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004
Wireless Sensor Networks (WSNs) have emerged as a new monitoring and control solution for a varie... more Wireless Sensor Networks (WSNs) have emerged as a new monitoring and control solution for a variety of applications. Although the behavior of a WSN is characterized by the type of its application, a common element exist: faults are a normal fact, not isolated events as in traditional networks. Thus, in order to guarantee the network quality of service it is essential for the WSN to be able to detect failures and perform something akin to healing, recovering from events that might cause some of its parts to malfunction. In this work we propose and evaluate a failure detection scheme using a management architecture for WSNs, called MANNA. We take a deep look at its fault management capabilities supposing the existence of an event-driven WSN. This is a challenging and attractive kind of WSN and we show how the use of automatic management services defined by MANNA can provide self-configuration, self-diagnostic, and self-healing (some of the self-managing capabilities). We also show that the management solution promote the resources productivity without incurring a high cost to the network.
International Conference on Networking, 2005
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited ... more Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, low-cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster-based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original LEACH.
Wireless sensor networks, 2008
By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptograp... more By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility, however, does not necessarily mean attractiveness, as the obtained results are still not satisfactory enough. In this paper, we present results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes. By doing that, we show that PKC is not only viable, but in fact attractive for WSNs. As far as we know pairing computations presented in this paper are the most efficient results on the MICA2 (8-bit/7.3828-MHz ATmega128L) and Tmote Sky nodes.
Advances in Mathematics of Communications, 2010
. A simple elliptic curve
Computer Communications, 2011
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can p... more Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between resilience and storage. Further, even though conventional public key and elliptic curve cryptosystem are computationally feasible on sensor nodes, protocols based on them are not. They require exchange and storage of large keys and certificates, which is expensive. Using Pairing-based Cryptography (PBC) protocols, conversely, parties can agree on keys without any interaction. In this work, we (i) show how security in WSNs can be bootstrapped using an authenticated identitybased non-interactive protocol and (ii) present TinyPBC, to our knowledge, the most efficient implementation of PBC primitives for an 8-bit processor. TinyPBC is an open source code able to compute pairings as well as binary multiplication in about 5.5s and 4019.46µs, respectively, on the ATmega128L 7.3828-MHz/4KB SRAM/128KB ROM processor -the MICA2 and MICAZ node processor.