Abstract
Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead.
This research has been supported in part by an Australian Research Council (ARC) Discovery grant (DP0452628) and a Macquarie University Research Development Grant (MQRDG).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Belinda, M.J.C.M., Dhas, C.S.G.: A study of security in wireless sensor networks. MASAUM Journal Of Reviews and Surveys 1, 91–95 (2009)
Blab, E.O., Zitterbart, M.: Towards acceptable public key cryptography in sensor networks. In: The 2nd International Workshop on Ubiquitous Computing (2005)
Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom. IEEE Computer Society Press, Los Alamitos (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC (2003)
Chen, C., Li, C.: Dynamic session key generation for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (2008)
Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)
Gaubatz, G., Kaps, J.P., Sunar, B.: Public key cryptography in sensor networks - revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)
The Open Group. Architecture for Public-Key Infrastructure, APKI (1999)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE, Los Alamitos (2003)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM Press, New York (2003)
Liu, D., Ning, P.: Multi-level mtesla: Broadcast authentication for distributed sensor networks. ACM Transactions in Embedded Computing Systems (TECS)Â 3 (2004)
Zhu, S., Liu, S.J.D., Ning, P.: Practical broadcast authentication in sensor networks. In: Proceedings of Proc. of MobiQuitous, Mobicom 2001 (July 2005)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: Analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. In: Proceedings of 7th Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001), Rome, Italy (2001)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 22, 120–126 (1978)
Singh, K., Muthukkumarasamy, V.: A minimal protocol for authenticated key distribution in wireless sensor networks. In: Proceedings of the 4th International Conference on Intelligent Sensing and Information Processing, Bangalore, India (December 2006)
Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, Washington DC, USA (2004)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: IEEE Infocom 2004 (March 2004)
Zhu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanism for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washinton DC, USA (2004)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In: IEEE Symposium on Security and Privacy (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, J., Shankaran, R., Orgun, M.A., Sattar, A., Varadharajan, V. (2012). A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-29154-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29153-1
Online ISBN: 978-3-642-29154-8
eBook Packages: Computer ScienceComputer Science (R0)