Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures like smart grid systems, we seek a Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold. The security challenge is that TAP messages have to be forwarded via the DSCC, which is exposed to various attacks and may turn rogue. In contrast, the nodes are arguably secure. For this `reverted security paradigm' we propose a TAP based on Shamir secret sharing, and discuss its correctness, optimizations and efficiency.

[1]  Jaydip Sen,et al.  Security in Wireless Sensor Networks , 2013, ArXiv.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[4]  W. K. Yip,et al.  A divisible extension of the Brands digital cash protocol: k-term coins implemented via secret sharing , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[5]  Mike Bond,et al.  Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.

[6]  Xenofon Koutsoukos,et al.  Consensus in networked multi-agent systems with adversaries , 2011 .

[7]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[8]  Qing Zhao,et al.  On the lifetime of wireless sensor networks , 2005, IEEE Communications Letters.

[9]  Mikhail J. Atallah,et al.  A Survey of Anti-Tamper Technologies , 2004 .

[10]  A. S. Poornima,et al.  A New Approach to Securing Broadcast Data in Sensor Networks , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[11]  Keith M. Martin,et al.  Updating the parameters of a threshold scheme by minimal broadcast , 2005, IEEE Transactions on Information Theory.

[12]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[13]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[14]  Dennis Shasha,et al.  The many faces of consensus in distributed systems , 1992, Computer.

[15]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[16]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[17]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.