Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks

被引:44
作者
Di Pietro, Roberto [1 ]
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
关键词
key management; wireless sensor networks; confidentiality; probabilistic authentication; information leakage; energy saving;
D O I
10.1007/s11276-006-6530-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed Wireless Sensor Network (WSN) is a collection of low-end devices with wireless message exchange capabilities. Due to the scarcity of hardware resources, the lack of network infrastructures, and the threats to security, implementing secure pair-wise communications among any pair of sensors is a challenging problem in distributed WSNs. In particular, memory and energy consumption as well as resilience to sensor physical compromise are the most stringent requirements. In this paper, we introduce a new threat model to communications confidentiality in WSNs, the smart attacker model. Under this new, more realistic model, the security features of previously proposed schemes decrease drastically. We then describe a novel pseudo-random key pre-deployment strategy ESP that combines all the following properties: (a) it supports an energy-efficient key discovery phase requiring no communications; (b) it provides node to node authentication; (c) it is highly resistant to the smart attacker. We provide both asymptotic results and extensive simulations of the schemes that are being proposed.
引用
收藏
页码:709 / 721
页数:13
相关论文
共 36 条
  • [1] Adamy DL, 2001, EW 101 1 COURSE ELEC
  • [2] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [3] Amis A. D., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P32, DOI 10.1109/INFCOM.2000.832171
  • [4] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [5] ANDERSON R, 2004, P IEEE INT C NETW PR
  • [6] Anderson Ross., 2001, SECURITY ENG GUIDE B
  • [7] [Anonymous], 2003, P 10 ACM C COMP COMM
  • [8] Basagni S., 2001, P 2001 ACM INT S MOB, P156
  • [9] BLOM R, 1985, LNCS, V338
  • [10] BLUNDO C, 1993, LNCS, V740