Authenticated queries in sensor networks

This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node capture attacks.

[1]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[2]  Tassos Dimitriou,et al.  Secure and Efficient In-Network Processing for Sensor Networks , 2004 .

[3]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[4]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[5]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[6]  Bart Preneel,et al.  Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks , 2005, SPC.

[7]  Matthew K. Franklin,et al.  Lower Bounds for Multicast Message Authentication , 2001, EUROCRYPT.

[8]  Haiyun Luo,et al.  Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.

[9]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[10]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[11]  Zinaida Benenson,et al.  An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[12]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[13]  Kefei Chen,et al.  SDD: Secure Distributed Diffusion Protocol for Sensor Networks , 2004, ESAS.

[14]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[15]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[17]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[19]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[20]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[22]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[23]  Shivakant Mishra,et al.  Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.

[24]  Wei Hong,et al.  The design of an acquisitional query processor for sensor networks , 2003, SIGMOD '03.

[25]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[26]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[27]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[28]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[29]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[30]  Ramesh Govindan,et al.  Networking support for query processing in sensor networks , 2004, CACM.

[31]  Yong Yao,et al.  The cougar approach to in-network query processing in sensor networks , 2002, SGMD.