作者: Katharine Chang , Kang G. Shin
关键词:
摘要: Security in wireless sensor networks has become important as they are being developed and deployed for an increasing number of applications. The severe resource constraints each make it very challenging to secure networks. Moreover, sensors usually hostile unattended environments hence susceptible various attacks, including node capture, physical tampering, manipulation the program. Park Shin [2005] proposed a soft tamper-proofing scheme that verifies integrity program device, called verification (PIV), which authenticate PIV servers (PIVSs) using centralized trusted third-party entities, such authentication (ASs). This article presents distributed protocol PIVSs (DAPP) without requiring commonly used ASs. DAPP uses Blundo [Blundo et al. 1992] establish pairwise keys one another. We also present cooperatively detect revoke malicious network. implement evaluate both on Mica2 Motes laptops, showing reduces sensors' communication traffic network by more than 90p energy consumption up 85p, compared case AS authenticating PIVSs. analyze security under attack models, demonstrating its capability dealing with diverse types attacks.