• DocumentCode
    2841494
  • Title

    Dynamic Merkle Trees for Verifying Privileges in Sensor Networks

  • Author

    Zhou, Li ; Ravishankar, Chinya V.

  • Author_Institution
    Department of Computer Science & Engineering, University of California, Riverside, Riverside, CA 92521, USA. lzhou@cs.ucr.edu
  • Volume
    5
  • fYear
    2006
  • fDate
    38869
  • Firstpage
    2276
  • Lastpage
    2282
  • Abstract
    Mobile sinks are already used in static sensor networks to facilitate data collection or network management, but it is possible in such networks for mobile sinks to be compromised and mount various insider attacks. Some schemes have been devised recently to limit the privileges of mobile sinks appropriately, but these are secure only when the number of compromised mobile sinks or sensors is below a network-wide threshold. This threshold is determined by a sensor´s memory, and is usually too small. We introduce dynamic Merkle trees, and show how to use them to restrict and verify the privilege of mobile sinks. Unlike current schemes, our scheme allows all sensors in a region to simultaneously verify mobile sink privileges, and does not assume a network-wide limit on the number of node compromises. As our security analysis shows, our approach is safe from fabrication attacks, impersonation attacks and replay attacks. Further, our performance analysis shows that we incur very low communication, computation, and storage overheads.
  • Keywords
    Authentication; Base stations; Computer science; Data engineering; Delay; Fabrication; Mobile communication; Mobile computing; Performance analysis; Sensor phenomena and characterization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2006. ICC '06. IEEE International Conference on
  • Conference_Location
    Istanbul
  • ISSN
    8164-9547
  • Print_ISBN
    1-4244-0355-3
  • Electronic_ISBN
    8164-9547
  • Type

    conf

  • DOI
    10.1109/ICC.2006.255109
  • Filename
    4024504