Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks

作者: Katharine Chang , Kang G. Shin

DOI: 10.1145/1341731.1341735

关键词:

摘要: Security in wireless sensor networks has become important as they are being developed and deployed for an increasing number of applications. The severe resource constraints each make it very challenging to secure networks. Moreover, sensors usually hostile unattended environments hence susceptible various attacks, including node capture, physical tampering, manipulation the program. Park Shin [2005] proposed a soft tamper-proofing scheme that verifies integrity program device, called verification (PIV), which authenticate PIV servers (PIVSs) using centralized trusted third-party entities, such authentication (ASs). This article presents distributed protocol PIVSs (DAPP) without requiring commonly used ASs. DAPP uses Blundo [Blundo et al. 1992] establish pairwise keys one another. We also present cooperatively detect revoke malicious network. implement evaluate both on Mica2 Motes laptops, showing reduces sensors' communication traffic network by more than 90p energy consumption up 85p, compared case AS authenticating PIVSs. analyze security under attack models, demonstrating its capability dealing with diverse types attacks.

参考文章(31)
Erdal Çayırcı, Vedat Çoşkun, Albert Levi, Serdar Sancak, Sensor wars: detecting and defending against spam attacks in tactical AdHoc sensor networks IEEE Press. ,(2004)
Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi, Self-configurable key pre-distribution in mobile ad hoc networks international conference on networking. pp. 1083- 1095 ,(2005) , 10.1007/11422778_87
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim, Remote software-based attestation for wireless sensors security of ad hoc and sensor networks. pp. 27- 41 ,(2005) , 10.1007/11601494_3
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
A.S. Wander, N. Gura, H. Eberle, V. Gupta, Sheueling Chang Shantz, Energy analysis of public-key cryptography for wireless sensor networks ieee international conference on pervasive computing and communications. pp. 324- 328 ,(2005) , 10.1109/PERCOM.2005.18
David Gay, Philip Levis, Robert von Behren, Matt Welsh, Eric Brewer, David Culler, The nesC language: a holistic approach to networked embedded systems programming language design and implementation. ,vol. 49, pp. 1- 11 ,(2003) , 10.1145/2641638.2641652
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958