RF Fingerprints for Secure Authentication in Single-Hop WSN

Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wireless transmission medium and by the limited hardware and software capabilities of the nodes in such networks. We analyze the requirements for using RF fingerprints to initialize secure authenticated links in a wireless sensor network for a surveillance application that allows older people to remain in their homes longer (termed the dasiaaging in placepsila application). Based on the lessons learned from our literature survey, we show that RF fingerprints alone are inadequate for authentication. We present a new authentication protocol based on digital credentials that binds together physical-layer RF fingerprint data with higher cryptographic protocol layer data which is practical, but also based on well-known and proven security principles.

[1]  Arthur I. Karshmer,et al.  Living assistance systems: an ambient intelligence approach , 2006, ICSE.

[2]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[3]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[4]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[5]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[6]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[7]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[8]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[9]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[10]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[11]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[12]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[13]  O. H. Tekbas,et al.  An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.

[14]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.

[15]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[16]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[17]  Martin Nemzow,et al.  Rethinking Public Key Infrastructures and Digital Certificates and Privacy , 2001 .

[18]  R.T. Johnk,et al.  Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[19]  Serge Vaudenay,et al.  Authenticated Multi-Party Key Agreement , 1996, ASIACRYPT.

[20]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[21]  Levente Buttyán,et al.  RANBAR: RANSAC-based resilient aggregation in sensor networks , 2006, SASN '06.

[22]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[23]  Upkar Varshney,et al.  Pervasive Healthcare and Wireless Health Monitoring , 2007, Mob. Networks Appl..

[24]  Guang Gong,et al.  Pre-Authentication and Authentication Models in Ad Hoc Networks , 2007 .

[25]  Faith Ellen,et al.  Hundreds of impossibility results for distributed computing , 2003, Distributed Computing.