Location-based compromise-tolerant security mechanisms for wireless sensor networks

被引:188
作者
Zhang, YC [1 ]
Liu, W
Lou, WJ
Fang, YG
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Scalable Network Technol, Los Angeles, CA 90045 USA
[3] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
compromise tolerance; location; pairing; security; wireless sensor networks;
D O I
10.1109/JSAC.2005.861382
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.
引用
收藏
页码:247 / 260
页数:14
相关论文
共 50 条
[1]  
[Anonymous], 2004, P 6 INT WORKSH CRYPT
[2]  
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[3]  
[Anonymous], 2003, ACM WORKSHOP SECURIT
[4]  
Baek J, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P124
[5]   Energy aware lossless data compression [J].
Barr, K ;
Asanovic, K .
PROCEEDINGS OF MOBISYS 2003, 2003, :231-244
[6]  
Barreto PSLM, 2004, LECT NOTES COMPUT SC, V3006, P17
[7]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[8]  
BASAGNI ERS, 2001, P ACM MOBIHOC LONG B, P256
[9]  
Bertoni G, 2005, COMPUTING TATE PAIRI
[10]  
BONEH D, 2001, LNCS, V2139