Realizing Robust User Authentication in Sensor Networks

We investigate how to organize access control to the WSN data in such a way that an unauthorized entity (the adversary) cannot make arbitrary queries to the WSN. We call this problem authenticated querying. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query comes from a legitimate user. Authenticated querying is especially challenging if the adversary can gain full control over some sensor nodes through physical access (node capture attack). We propose first solution to this problem and present our experiments with an implementation of the first step of this solution.

[1]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[2]  Zinaida Benenson,et al.  An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[3]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.

[4]  Zinaida Benenson,et al.  Authenticated queries in sensor networks , 2005 .

[5]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[6]  Ramesh Govindan,et al.  Networking support for query processing in sensor networks , 2004, CACM.

[7]  Wolfgang Bauer Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[10]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[11]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[12]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[13]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[14]  David E. Culler,et al.  Versatile low power media access for wireless sensor networks , 2004, SenSys '04.