Skip to main content

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks

  • Conference paper
Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous 2010)

Abstract

Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead.

This research has been supported in part by an Australian Research Council (ARC) Discovery grant (DP0452628) and a Macquarie University Research Development Grant (MQRDG).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Belinda, M.J.C.M., Dhas, C.S.G.: A study of security in wireless sensor networks. MASAUM Journal Of Reviews and Surveys 1, 91–95 (2009)

    Google Scholar 

  2. Blab, E.O., Zitterbart, M.: Towards acceptable public key cryptography in sensor networks. In: The 2nd International Workshop on Ubiquitous Computing (2005)

    Google Scholar 

  3. Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC (2003)

    Google Scholar 

  5. Chen, C., Li, C.: Dynamic session key generation for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking (2008)

    Google Scholar 

  6. Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In: Proceedings of 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (2005)

    Google Scholar 

  7. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)

    Chapter  Google Scholar 

  9. Gaubatz, G., Kaps, J.P., Sunar, B.: Public key cryptography in sensor networks - revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. The Open Group. Architecture for Public-Key Infrastructure, APKI (1999)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE, Los Alamitos (2003)

    Google Scholar 

  12. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA (2003)

    Google Scholar 

  13. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM Press, New York (2003)

    Chapter  Google Scholar 

  14. Liu, D., Ning, P.: Multi-level mtesla: Broadcast authentication for distributed sensor networks. ACM Transactions in Embedded Computing Systems (TECS) 3 (2004)

    Google Scholar 

  15. Zhu, S., Liu, S.J.D., Ning, P.: Practical broadcast authentication in sensor networks. In: Proceedings of Proc. of MobiQuitous, Mobicom 2001 (July 2005)

    Google Scholar 

  16. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: Analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  17. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. In: Proceedings of 7th Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001), Rome, Italy (2001)

    Google Scholar 

  18. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 22, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  19. Singh, K., Muthukkumarasamy, V.: A minimal protocol for authenticated key distribution in wireless sensor networks. In: Proceedings of the 4th International Conference on Intelligent Sensing and Information Processing, Bangalore, India (December 2006)

    Google Scholar 

  20. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: Securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, Washington DC, USA (2004)

    Google Scholar 

  21. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: IEEE Infocom 2004 (March 2004)

    Google Scholar 

  22. Zhu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanism for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), Washinton DC, USA (2004)

    Google Scholar 

  23. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In: IEEE Symposium on Security and Privacy (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Zhang, J., Shankaran, R., Orgun, M.A., Sattar, A., Varadharajan, V. (2012). A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29154-8_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29153-1

  • Online ISBN: 978-3-642-29154-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics