Sensor Authentication in Collaborating Sensor Networks

被引:0
|
作者
Bielefeldt, Jake [1 ]
Chellappan, Sriram [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
来源
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET) | 2014年
关键词
Sensor Networks; Collaboration; Authentication; Physically Unclonable Functions; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O-i of Sensor Network S-i to correctly determine the number of active sensors in Network S-i. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first paper that addresses a practical security problem in collaborating sensor networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Trust Based Authentication Mechanism in Wireless Sensor Networks
    Li, Ru-ping
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2016, 12 (01) : 58 - 63
  • [42] Key establishment and authentication mechanism for secure sensor networks
    Doh, I
    Chae, K
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 335 - 344
  • [43] Efficient Broadcast Authentication for Wireless Sensor and Actuator Networks
    Szucsich, Stefan
    Krammer, Lukas
    Kastner, Wolfgang
    Novak, Thomas
    39TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2013), 2013, : 4457 - 4463
  • [44] An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    Bari, Inam
    Jan, Naveed
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 123 - 131
  • [45] Authentication and Key Establishment in Dynamic Wireless Sensor Networks
    Qiu, Ying
    Zhou, Jianying
    Baek, Joonsang
    Lopez, Javier
    SENSORS, 2010, 10 (04) : 3718 - 3731
  • [46] Simple and Secure Node Authentication in Wireless Sensor Networks
    Vardhan, Aishwarya
    Hussain, Muzzammil
    Garimella, Rama Murthy
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [47] An improved user authentication protocol for wireless sensor networks
    Kaur, Damandeep
    Kumar, Devender
    Saini, Khushil Kumar
    Grover, Harmanpreet Singh
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [48] Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks
    Abid, Aasma
    Hussain, Mukhtar
    Kausar, Firdous
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 316 - +
  • [49] An Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Althobaiti, Ohood
    Al-Rodhaan, Mznah
    Al-Dhelaan, Abdullah
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [50] Enhanced User Authentication Scheme for Wireless Sensor Networks
    Park, Hee-Joo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 367 - 374