Abstract
We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshness without message expansion. We take the typical resource constraints of wireless sensor networks into account. The security provisions can be superimposed on several communication models, such as the epidemic communication model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenets. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156–163. ACM Press, New York (2001)
Bellare, M., Yee, B.: Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001/035 (2001)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)
Gavidia, D., Voulgaris, S., van Steen, M.: Epidemic-style monitoring in large-scale sensor networks. Technical Report IR-CS-012.05, Vrije Universiteit Amsterdam (March 2005), http://www.cs.vu.nl/pub/papers/globe/IR-CS-012.05.pdf
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp. 93–104. ACM Press, New York (2000), doi:10.1145/378993.379006
Hu, F., Sharma, N.: Security considerations in ad hoc sensor networks. Ad Hoc Networks 3(1), 69–89 (2005)
Jamshaid, K., Schwiebert, L.: Seken (secure and efficient key exchange for sensor networks). In: Performance, Computing, and Communications, 2004 IEEE International Conference on, pp. 415–422 (2004)
Jones, K., Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M.: Towards a new paradigm for securing wireless sensor networks. In: NSPW 2003: Proceedings of the 2003 workshop on New security paradigms, pp. 115–121. ACM Press, New York (2003)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: SenSys 2004: Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162–175. ACM Press, New York (2004)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, February 1997. RFC (2104)
Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing security-critical energy-efficient sensor networks. Technical Report TR-CTIT-02-18, University of Twente, The Netherlands (July 2002), http://purl.org/utwente//38381
Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop, MIT, Cambridge (2003)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Pirzada, A.A., McDonald, C.: Kerberos assisted authentication in mobile ad-hoc networks. In: CRPIT 2004: Proceedings of the 27th conference on Australasian computer science, Darlinghurst, Australia, pp. 41–46. Australian Computer Society, Inc. (2004)
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. In: Nachiketh, R. (ed.) ISLPED 2003: Proceedings of the 2003 international symposium on Low power electronics and design, pp. 30–35. ACM Press, New York (2003)
Venugopalan, R., Ganesan, P., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: CASES 2003: Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, pp. 188–197. ACM Press, New York (2003)
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. Technical report, Shandong University, Shandong, China (June 2005)
Wang, Y.: Robust key establishment in sensor networks. SIGMOD Rec. 33(1), 14–19 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mauw, S., van Vessem, I., Bos, B. (2006). Forward Secure Communication in Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_4
Download citation
DOI: https://doi.org/10.1007/11734666_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33376-0
Online ISBN: 978-3-540-33377-7
eBook Packages: Computer ScienceComputer Science (R0)