Secure Wireless Sensor Networks

Confidentiality and authentication are crucial to wireless sensor networks when sensors are deployed in hostile environments, e.g., battle fields and antiterrorist operations. In this paper, we come up with (1) a group key distribution protocol for a base station to distribute a group key to sensors and (2) a broadcast authentication protocol for sensors to authenticate messages broadcasted by a base station. Security and performance analysis show that both protocols are secure and efficient. In addition, our group key distribution protocol supports dynamic wireless sensor network which allows new sensors to be added in and compromised sensors to be forced to leave.

[1]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[2]  Gene Tsudik,et al.  Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.

[3]  Arjen K. Lenstra,et al.  Integer Factoring , 2000, Encyclopedia of Cryptography and Security.

[4]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[5]  Min-Shiang Hwang Dynamic participation in a secure conference scheme for mobile communications , 1999 .

[6]  Archana Bharathidasan,et al.  Sensor Networks : An Overview , 2002 .

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[9]  Gene Tsudik,et al.  New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Yongdae Kim,et al.  Secure Group Communication Using Robust Contributory Key Agreement , 2001 .

[12]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[17]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.