Securing wireless sensor networks against aggregator compromises

被引:18
作者
Claveirole, Thomas [1 ]
de Amorim, Marcelo Dias [1 ,2 ]
Abdalla, Michel [2 ]
Viniotis, Yannis
机构
[1] Univ Paris 06, F-75252 Paris 05, France
[2] CNRS, F-75700 Paris, France
关键词
D O I
10.1109/MCOM.2008.4481352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. We propose three schemes to secure data aggregation that rely on multipath routing. The first guarantees data confidentiality through secret sharing, while the second and third provide data availability through information dispersal. Based on qualitative analysis and implementation, we show that by applying these schemes, a sensor network can achieve data confidentiality, authenticity, and protection against denial of service attacks even in the presence of multiple compromised nodes.
引用
收藏
页码:134 / 141
页数:8
相关论文
共 10 条
[1]  
[Anonymous], MOBIHOC
[2]  
[Anonymous], 2004, Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks-SASN '04
[3]  
[Anonymous], 2003, PROC 1 INT C EMBEDDE
[4]  
[Anonymous], 2005, PROC ACM C EMERG NET
[5]  
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[6]  
*CROSSB, MICAZ DAT SHEET
[7]  
Ganesan D., 2001, MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, P251, DOI 10.1145/501416.501452
[8]  
Hu LX, 2003, 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, P384, DOI 10.1109/SAINTW.2003.1210191
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613