Forward Secure Communication in Wireless Sensor Networks

We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshness without message expansion. We take the typical resource constraints of wireless sensor networks into account. The security provisions can be superimposed on several communication models, such as the epidemic communication model.

[1]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[2]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[3]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[6]  S.A. Weis RFID privacy workshop , 2004, IEEE Security & Privacy Magazine.

[7]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[8]  Frank Mueller,et al.  Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.

[9]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[12]  Loren Schwiebert,et al.  SEKEN: secure and efficient key exchange for sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[13]  Yongge Wang,et al.  Robust key establishment in sensor networks , 2004, SGMD.

[14]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[15]  Mihir Bellare,et al.  Forward-Security in Private-Key Cryptography , 2003, CT-RSA.

[16]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .

[17]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[18]  M. V. Steen,et al.  Epidemic-style Monitoring in Large-Scale Sensor Networks , 2005 .

[19]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[20]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[21]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[22]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.