Loading [MathJax]/extensions/MathMenu.js
Location-based compromise-tolerant security mechanisms for wireless sensor networks | IEEE Journals & Magazine | IEEE Xplore

Location-based compromise-tolerant security mechanisms for wireless sensor networks


Abstract:

Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a...Show More

Abstract:

Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.
Published in: IEEE Journal on Selected Areas in Communications ( Volume: 24, Issue: 2, February 2006)
Page(s): 247 - 260
Date of Publication: 28 February 2006

ISSN Information:

References is not available for this document.

I. Introduction

Wireless sensor networks (WSNs) have attracted a lot of attention recently due to their broad applications in both military and civilian operations. Many WSNs are deployed in unattended and often hostile environments such as military and homeland security operations. Therefore, security mechanisms providing confidentiality, authentication, data integrity, and nonrepudiation, among other security objectives, are vital to ensure proper network operations.

Select All
1.
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures", Ad Hoc Netw., vol. 1, no. 2, pp. 293-315, 2003.
2.
J. R. Douceur, "The Sybil attack", Proc. 1st Int. Workshop on Peer-to-Peer Syst., pp. 251-260, 2002-Mar.
3.
J. Newsome, E. Shi, D. Song and A. Perrig, Proc. 3rd Int. Symp. Inf. Process. Sensor Netw., pp. 259-268, 2004-Apr.
4.
F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks", Proc. IEEE INFOCOM, pp. 2446-2457, 2004-Mar.
5.
S. Zhu, S. Setia, S. Jajodia and P. Ning, "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks", Proc. IEEE Symp. Security Privacy, pp. 259-271, 2004-May.
6.
E. R. S. Basagni, K. Herrin and D. Bruschi, "Secure pebblenets", Proc. ACM MobiHoc, pp. 256-263, 2001-Oct.
7.
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks", Proc. ACM CCS, pp. 41-47, 2002-Nov.
8.
H. Chan, A. Perrig and D. Song, "Random key predistribution schemes for sensor networks", Proc. IEEE Symp. Security Privacy, pp. 197-213, 2003-May.
9.
W. Du, J. Deng, Y. Han and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks", Proc. ACM CCS, pp. 42-51, 2003-Oct.
10.
D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks", Proc. ACM CCS, pp. 52-61, 2003-Oct.
11.
D. Liu and P. Ning, "Location-based pairwise key establishments for static sensor networks", Proc. ACM SASN, pp. 72-82, 2003-Oct.
12.
W. Du, J. Deng, Y. Han, S. Chen and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge", Proc. IEEE INFOCOM, pp. 586-597, 2004-Mar.
13.
D. Huang, M. Mehta, D. Medhi and L. Harn, "Location-aware key management scheme for wireless sensor networks", Proc. ACM SASN, pp. 29-42, 2004-Oct.
14.
Y. Zhou, Y. Zhang and Y. Fang, "LLK: A link-layer key establishment scheme in wireless sensor networks", Proc. IEEE WCNC, pp. 1921-1926, 2005-Mar.
15.
A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat monitoring: Application driver for wireless communications technology", Proc. ACM SIGCOMM Workshop Data Comm. Latin America and the Caribbean, pp. 20-41, 2001-Apr.
16.
B. Karp and H. Kung, "GPSR: Greedy perimeter stateless routing for wireless networks", Proc. ACM MobiCom, pp. 243-254, 2000-Aug.
17.
K. Barr and K. Asanovic, "Energy aware lossless data compression", Proc. 1st Int. Conf. Mobile Syst. Applicat. Services, pp. 231-244, 2003-May.
18.
A. Shamir, "Identity based cryptosystems and signature schemes" in Lecture Notes in Computer Science, New York:Springer-Verlag, vol. 196, pp. 47-53, 1984.
19.
D. Boneh and M. Franklin, "Identify-based encryption from the Weil pairing" in Lecture Notes in Computer Science, New York:Springer-Verlag, vol. 2139, pp. 213-229, 2001.
20.
P. Barreto, H. Kim, B. Bynn and M. Scott, "Efficient algorithms for pairing-based cryptosystems" in Lecture Notes in Computer Science, New York:Springer-Verlag, vol. 2442, pp. 354-368, 2002.
21.
"Federal information processing standards publication 180-1 NIST", Digital Hash Standard, Apr. 1995.
22.
S. Čapkun (Capkun) and J.-P. Hubaux, "Secure positioning of wireless devices with application to sensor networks", Proc. IEEE INFOCOM, pp. 1917-1928, 2005-March.
23.
Y. Zhang, W. Liu and Y. Fang, "Secure localization in wireless sensor networks", Proc. IEEE MILCOM, 2005.
24.
L. Lazos and R. Poovendran, "Serloc: Secure range-independent localization for wireless sensor networks", Proc. ACM WiSe, pp. 21-30, 2004-Oct.
25.
D. Liu, P. Ning and W. Du, "Attack-resistant location estimation in sensor networks", Proc. IPSN, pp. 99-103, 2005-Apr.
26.
W. Du, L. Fang and P. Ning, "LAD: Localization anomaly detection for wireless sensor networks", Proc. IPDPS, 2005-Apr.
27.
S. Zhu, S. Setia and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks", Proc. ACM CCS, pp. 62-72, 2003-Oct.
28.
L. Chen and C. Kudla, Identity based authenticated key agreement protocols from pairings, 2002.
29.
Y. Hu, A. Perrig and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks", Proc. IEEE INFOCOM, pp. 1976-1986, 2003-Apr.
30.
S. Kumar, T. Lai and J. Balogh, "On k-coverage in a mostly sleeping sensor network", Proc. ACM MobiCom, pp. 144-158, 2004-Sep./Oct.
Contact IEEE to Subscribe

References

References is not available for this document.