• DocumentCode
    1362235
  • Title

    The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks

  • Author

    Rasheed, Amar ; Mahapatra, Rabi N.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Texas A&M Univ., College Station, TX, USA
  • Volume
    23
  • Issue
    5
  • fYear
    2012
  • fDate
    5/1/2012 12:00:00 AM
  • Firstpage
    958
  • Lastpage
    965
  • Abstract
    Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.
  • Keywords
    mobile communication; private key cryptography; public key cryptography; telecommunication security; wireless sensor networks; attacker; authentication mechanism; compromised sensor; data accumulation; data collection; key pool; localized sensor reprogramming; mobile sink; mobile sink replication attack; pairwise key establishment; pairwise key predistribution scheme; polynomial pool-based scheme; probabilistic key predistribution scheme; q-composite key predistribution scheme; security challenge; stationary access node replication attack; three-tier security scheme; wireless sensor networks; Authentication; Mobile communication; Mobile computing; Polynomials; Probabilistic logic; Wireless sensor networks; Distributed; security; wireless sensor networks.;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2010.185
  • Filename
    5611499