Skip to main content

Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs

  • Conference paper
Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4357))

Included in the following conference series:

  • 551 Accesses

Abstract

Once a wireless sensor network (WSN) is stable and has been running for a while, sensors start to fail due to hardware problems, battery exhaustion or even due to their physical destruction. In any case, the administrator of the network may wish to replace the damaged nodes with new ones to reinforce the coverage area. In this paper we make use of an out of band channel (OOB) to bootstrap an authenticated symmetric key. The protocol ensures that the new sensor nodes are currently part of the region covered by the network before negotiating sensitive key material and making them a part of the system and its operations. We describe a novel approach to group admission for wireless sensor networks using an OOB secure channel and perform a security evaluation over this protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pietro, R.D., Mancini, L., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), pp. 62–71 (2003)

    Google Scholar 

  2. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8, 521–534 (2002)

    Article  MATH  Google Scholar 

  3. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

  4. Zhu, S., Setia, S., Jajodia, S.: Leap: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 62–72. ACM Press, New York (2003)

    Chapter  Google Scholar 

  5. Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks (2002)

    Google Scholar 

  6. Hoepman, J.: The ephemeral pairing problem. In: 8th Int. Conf. Finantial Cryptography, Key West, FL, USA (2004)

    Google Scholar 

  7. McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: SP 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 110–124. IEEE Computer Society, Washington (2005)

    Google Scholar 

  8. Wong, F.L., Stajano, F.: Multi-channel protocols. In: Proceedings of Security Protocols Workshop. LNCS, Springer, Heidelberg (2005)

    Google Scholar 

  9. Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes 7, 29–37 (2004)

    Google Scholar 

  10. Holmquist, L., Friedemann, M., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review, ACM SIGCOMM 26, 5–26 (1996)

    Article  Google Scholar 

  12. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  13. Research, C.: Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Version 1.0 (2000)

    Google Scholar 

  14. Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. Research Report in the IACR ePrint archive (2005), http://eprint.iacr.org/2005/424

  15. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Cryptographic Hardware and Embedded Systems (CHES), 119–132 (2004)

    Google Scholar 

  16. Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: Umac: Fast and secure message authentication. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216–233. Springer, Heidelberg (1999)

    Google Scholar 

  17. Hill, J., Levis, P., Madden, S., Woo, A., Polastre, J., Whitehouse, C., Szewczyk, R., Sharp, C., Gay, D., Welsh, M., Culler, D., Brewer, E.: TinyOS (2005), http://www.tinyos.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Girao, J., Martin, M. (2006). Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_8

Download citation

  • DOI: https://doi.org/10.1007/11964254_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69172-3

  • Online ISBN: 978-3-540-69173-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics