Sensor Authentication in Collaborating Sensor Networks

被引:0
|
作者
Bielefeldt, Jake [1 ]
Chellappan, Sriram [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
来源
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET) | 2014年
关键词
Sensor Networks; Collaboration; Authentication; Physically Unclonable Functions; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O-i of Sensor Network S-i to correctly determine the number of active sensors in Network S-i. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first paper that addresses a practical security problem in collaborating sensor networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Authentication review for nodes in Wireless Sensor Networks
    Arias, Miguel Alfredo Acedo
    Vilchis, Mar-A Aurora Molina
    Ortigoza, Ramon Silva
    Melchor, Magdalena Marciano
    Flores, Edgar Alfredo Portilla
    TELEMATIQUE, 2009, 8 (01):
  • [22] Efficient Broadcast Authentication in Wireless Sensor Networks
    Du, Zhiqiang
    Wang, Kun
    Zhou, Lihua
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 187 - 192
  • [23] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [24] Cooperative Authentication in Underwater Acoustic Sensor Networks
    Diamant, Roee
    Casari, Paolo
    Tomasin, Stefano
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (02) : 954 - 968
  • [25] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [26] Improvements on an authentication scheme for vehicular sensor networks
    Liu, Joseph K.
    Yuen, Tsz Hon
    Au, Man Ho
    Susilo, Willy
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (05) : 2559 - 2564
  • [27] An efficient authentication strategy for reprogramming of sensor networks
    Tan, Jin
    Chen, JinTan
    Liu, YanQiu
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 833 - +
  • [28] Multimodal biometric authentication in wireless sensor networks
    Galloway, B. M.
    Niezen, G.
    Hancke, G. P.
    Silva, B. J.
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 1003 - 1007
  • [29] Optimized hash tree for authentication in sensor networks
    Kondratieva, Veronika
    Seo, Seung-Woo
    IEEE COMMUNICATIONS LETTERS, 2007, 11 (02) : 149 - 151
  • [30] An Authentication Protocol for Sensor Networks using Pairings
    Salinas R., Moises
    Gallegos G., Gina
    Duchen S., Gonzalo
    2009 INTERNATIONAL CONFERENCE ON ELECTRICAL COMMUNICATIONS AND COMPUTERS, 2009, : 168 - 172