Sensor Authentication in Collaborating Sensor Networks

被引:0
|
作者
Bielefeldt, Jake [1 ]
Chellappan, Sriram [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
来源
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET) | 2014年
关键词
Sensor Networks; Collaboration; Authentication; Physically Unclonable Functions; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O-i of Sensor Network S-i to correctly determine the number of active sensors in Network S-i. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first paper that addresses a practical security problem in collaborating sensor networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Broadcast authentication algorithm for wireless sensor networks
    Yao, Xuan-Xia
    Zheng, Xue-Feng
    Zhou, Xian-Wei
    Tongxin Xuebao/Journal on Communications, 2010, 31 (11): : 49 - 55
  • [32] Lightweight Authentication for Recovery in Wireless Sensor Networks
    Li, B.
    Batten, L. M.
    Doss, R.
    2009 FIFTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS, 2009, : 465 - 471
  • [33] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [34] A Hierarchical Authentication Scheme in Wireless Sensor Networks
    Wu, Bing
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 630 - 635
  • [35] Energy efficient authentication in wireless sensor networks
    Soderlund, Rickard
    Svensson, Stefan
    Lennvall, Tomas
    ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 1412 - +
  • [36] Practical broadcast authentication protocol for sensor networks
    Du Z.-Q.
    Shen Y.-L.
    Ma J.-F.
    Zhou L.-H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2010, 37 (02): : 305 - 310+325
  • [37] A Secure Authentication Mechanism for Wireless Sensor Networks
    Ali, Rifaqat
    Chandrakar, Preeti
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    Pal, Arup Kumar
    Islam, S. K. Hafizul
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 206 - 213
  • [38] Efficient sensor node authentication in third generation-wireless sensor networks integrated networks
    Han, K.
    Kim, K.
    Park, J.
    Shon, T.
    IET COMMUNICATIONS, 2011, 5 (12) : 1744 - 1754
  • [39] Key renewal scheme with sensor authentication under clustered wireless sensor networks
    Lee, Saewoom
    Kim, Kiseon
    ELECTRONICS LETTERS, 2015, 51 (04) : 368 - 369
  • [40] ID-based Sensor Node Authentication for Multi-Layer Sensor Networks
    Sung, Soonhwa
    Ryou, Jaecheol
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (04) : 363 - 370