Distributed node authentication in wireless sensor networks

We address the issue of node authenticity in large sensor networks. Only sensor nodes that are verified can be accepted by the network. In this paper, we propose distributed node authentication schemes which rely on public information and the majority rules. In the basic scheme, each node's neighbors stores its identity and location information. When node A needs to check the authenticity of node B, it obtains information from node B's neighbors. To cut down the communication overhead of the basic scheme, we propose an improved scheme in which the terrain is divided into zones. Each node's vouchers disseminate in all zones. Therefore, node A can obtain information from node B's vouchers in the zone that it resides in. Analysis and simulation results show that the distributed schemes are effective and adaptable.

[1]  R.L. Moses,et al.  Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.

[2]  Brad Karp,et al.  GPSR : Greedy Perimeter Stateless Routing for Wireless , 2000, MobiCom 2000.

[3]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[4]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[5]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[6]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[7]  Daniel Massey,et al.  Security Through Publicity , 2006, HotSec.

[8]  Scott Rose,et al.  Protocol Modifications for the DNS Security Extensions , 2005, RFC.

[9]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[10]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[11]  Young-Jin Kim,et al.  Multi-dimensional range queries in sensor networks , 2003, SenSys '03.

[12]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[13]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[14]  Joseph Kee-yin Ng,et al.  Extensions to BGP to Support Secure Origin BGP , 2004 .