Pseudonymous communications in secure industrial wireless sensor networks

Wireless sensor networks are becoming widely deployed in the industry. They are used to provide contextual information about the industrial environment being surveyed, to control and monitor the industrial processes, and even for workers who can be augmented with sensors. In these wireless networks, an adversary can easily eavesdrop communications with the aim to collect private information about sensors, because of the open nature of the wireless medium. A usual solution to prevent privacy violation relies on the use of pseudonyms as sensor identities; however, pseudonyms may deter authentication and access control enforcement in the network. This paper introduces an efficient pseudonym-based scheme that provides privacy protection to sensors without compromising network access security.

[1]  Satyajayant Misra,et al.  SAS: A Simple Anonymity Scheme for Clustered Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[2]  Charles Clancy,et al.  Channel Binding Support for EAP Methods , 2008 .

[3]  Satyajayant Misra,et al.  Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.

[4]  Pasi Eronen,et al.  IKEv2 Mobility and Multihoming Protocol (MOBIKE) , 2006, RFC.

[5]  寺岡 文男,et al.  Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .

[6]  Yoshihiro Ohba,et al.  Definition of Master Key between PANA Client and Enforcement Point , 2010, RFC.

[7]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[8]  Utz Roedig,et al.  Securing Internet of Things with Lightweight IPsec , 2010 .

[9]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[10]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[11]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[12]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[13]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[14]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[15]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[16]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[17]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[18]  Yurong Xu,et al.  Providing Anonymity in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.