CRINet: A secure and fault-tolerant data collection scheme using 3-way forwarding and group key management in wireless sensor networks

A critical security threat in a WSN is the compromising of sensor nodes. Not only can attackers use such vulnerability to eavesdrop on the dataflow, but could also inject bogus information into the network. However, most current secure data collection methods trade fault-tolerant ability for end-to-end protection, thus with poor performance. This work proposes CRINet, a secure and fault-tolerant data collection scheme with group key management mechanism. To achieve high reliability, sensing data would be transferred to the sink through multi-path. EBS is applied in CRINet for group key management in order to reduce re-key efforts. Simulation results demonstrate that CRINet scheme is superior in terms of data confidentiality and availability.

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Suman Roy,et al.  Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[4]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[5]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[6]  Mohamed Eltoweissy,et al.  Dynamic combinatorial key management scheme for sensor networks , 2006, Wirel. Commun. Mob. Comput..

[7]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[8]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[11]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[12]  Yiwei Thomas Hou,et al.  BeamStar: An Edge-Based Approach to Routing in Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[13]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[14]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[15]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[16]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[17]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.