DocumentCode
2841494
Title
Dynamic Merkle Trees for Verifying Privileges in Sensor Networks
Author
Zhou, Li ; Ravishankar, Chinya V.
Author_Institution
Department of Computer Science & Engineering, University of California, Riverside, Riverside, CA 92521, USA. lzhou@cs.ucr.edu
Volume
5
fYear
2006
fDate
38869
Firstpage
2276
Lastpage
2282
Abstract
Mobile sinks are already used in static sensor networks to facilitate data collection or network management, but it is possible in such networks for mobile sinks to be compromised and mount various insider attacks. Some schemes have been devised recently to limit the privileges of mobile sinks appropriately, but these are secure only when the number of compromised mobile sinks or sensors is below a network-wide threshold. This threshold is determined by a sensor´s memory, and is usually too small. We introduce dynamic Merkle trees, and show how to use them to restrict and verify the privilege of mobile sinks. Unlike current schemes, our scheme allows all sensors in a region to simultaneously verify mobile sink privileges, and does not assume a network-wide limit on the number of node compromises. As our security analysis shows, our approach is safe from fabrication attacks, impersonation attacks and replay attacks. Further, our performance analysis shows that we incur very low communication, computation, and storage overheads.
Keywords
Authentication; Base stations; Computer science; Data engineering; Delay; Fabrication; Mobile communication; Mobile computing; Performance analysis; Sensor phenomena and characterization;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications, 2006. ICC '06. IEEE International Conference on
Conference_Location
Istanbul
ISSN
8164-9547
Print_ISBN
1-4244-0355-3
Electronic_ISBN
8164-9547
Type
conf
DOI
10.1109/ICC.2006.255109
Filename
4024504
Link To Document