Routing-guided authentication in Wireless Sensor Networks

Entity authentication is a crucial security objective since it enables network nodes to verify the identity of each other. Wireless Sensor Networks (WSNs) are composed of a large number of possibly mobile nodes, which are limited in computational, storage and energy resources. These characteristics pose a challenge to entity authentication protocols and security in general. We propose an authentication protocol whose execution is integrated within routing. This is in contrast to currently proposed protocols, in which a node tries to authenticate itself to other nodes without an explicit tie to the underlying routing protocol. In our protocol, nodes discover shared keys, authenticate themselves to each other and build routing paths all in a synergistic way.

[1]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[4]  Philip Levis,et al.  TinyOS Programming: Introduction , 2009 .

[5]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[6]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[7]  Taeshik Shon,et al.  Sensor Authentication in Dynamic Wireless Sensor Network Environments , 2012 .

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[12]  Thomas Y. C. Woo,et al.  Authentication for distributed systems , 1997, Computer.

[13]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[14]  NetworksWendi Rabiner Heinzelman,et al.  Adaptive Proto ols for Information Dissemination in Wireless Sensor , 1999 .

[15]  Imad Mahgoub,et al.  A Hierarchical Key Establishment Scheme forWireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[16]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[17]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[18]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[19]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[20]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[21]  P. Udaya Sri S. Sravani G. Priyankia Security protocols for Wireless Sensor Networks , 2017 .

[22]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[23]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[24]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[25]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[26]  Ashok Kumar Das A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge , 2011, ArXiv.