Securing network access in wireless sensor networks

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure network access system for wireless sensor networks. This paper makes three contributions: First, it develops a network admission control subsystem using Elliptic Curve public key cryptosystem to add new sensor nodes into a sensor network. The admission control subsystem employs a polynomial-based weak authentication scheme to mitigate Denial of Service (DoS) attacks against the public key cryptographic operations. Second, it implements an interface in TinyOS to provide symmetric key cryptography using the hardware security support in IEEE 802.15.4 radio components (e.g., CC2420). The hardware security can satisfy both message authentication and timely delivery requirements in real-time applications. The third contribution is an implementation of a stateless group key update scheme to update a network-wide secret key in a sensor network. We implement all the proposed techniques on Imote2 sensor platform running TinyOS and conduct an evaluation through field experiments.

[1]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[2]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[3]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[4]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[5]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[6]  Benjamin Arazi,et al.  CERTIFICATION OF DL / EC KEYS , 1999 .

[7]  Peng Ning,et al.  TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[8]  NingPeng,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005 .

[9]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[11]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[12]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[13]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.