A Lightweight Scheme for Trust Relationship Establishment in Ubiquitous Sensor Networks

Ubiquitous sensor networks are application oriented system, which are composed of a large number of cooperative sensor nodes. The identification of individual sensor node is important especially for some security-sensitive applications. In this paper, we focus on the establishment of trust relationship among wireless sensor nodes, and try to combine the message authentication and identity authentication as a countermeasure to hostile attack. Accompanied with a simple lightweight key pre-distribution algorithm, in which each node sends only one message, we propose a lightweight trust relationship establishing scheme for ubiquitous sensor networks. The new scheme, which works without a trusted authority in the network, is not only concise in format but effective in practice to ensure network trusted and secure.

[1]  Daoben Li,et al.  An Improved Elegant Method to Re-initialize Hash Chains , 2005, IACR Cryptol. ePrint Arch..

[2]  Dirk Westhoff,et al.  Zero Common-Knowledge Authentication for Pervasive Networks , 2003, Selected Areas in Cryptography.

[3]  Kang G. Shin,et al.  Soft tamper-proofing via program integrity verification in wireless sensor networks , 2005, IEEE Transactions on Mobile Computing.

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Tassos Dimitriou,et al.  A localized, distributed protocol for secure information exchange in sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[8]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[9]  Vipul Goyal,et al.  How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..

[10]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[11]  Tassos Dimitriou,et al.  Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks , 2005, ADHOC-NOW.

[12]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[13]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[14]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[15]  Dirk Westhoff,et al.  Recognition in a low-power environment , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[16]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[17]  Thomas F. La Porta,et al.  Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.