Secure decentralized data transfer against node capture attacks for wireless sensor networks

In wireless sensor networks, sensor nodes have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems, so maintaining confidentiality is an important problem. Most security methods are based on common or public key cryptosystems. However, these methods have problems with encryption of data. When nodes try to encrypt data, they must preestablish keys. When nodes send data to the sink node, all of the exchanged information will concentrate in the sink node. This creates a single point of failure. In this paper, we propose a new distribution method resilient against node capture attacks using the Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks. Also, we compare the resiliency to existing pairwise key establishment methods.

[1]  Wenliang Du,et al.  Diversify sensor nodes to improve resilience against node compromise , 2006, SASN '06.

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[5]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[6]  Ivan Stojmenovic,et al.  Handbook of Sensor Networks: Algorithms and Architectures , 2005, Handbook of Sensor Networks.

[7]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[9]  Sajal K. Das,et al.  Security in Wireless Sensor Networks: A Survey , 2006 .

[10]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[11]  Aldar C-F. Chan Probabilistic Distributed Key Pre-distribution for Mobile Ad hoc Networks ( ICC 04 ) , 2004 .

[12]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[15]  Saumya K. Debray,et al.  Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.

[16]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[17]  M. Horton MICA: The Commercialization of Microsensor Motes , 2002 .

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.