DocumentCode :
817612
Title :
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Author :
Zhang, Yanchao ; Liu, Wei ; Lou, Wenjing ; Fang, Yuguang
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Florida, Gainesville, FL, USA
Volume :
24
Issue :
2
fYear :
2006
Firstpage :
247
Lastpage :
260
Abstract :
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.
Keywords :
message authentication; private key cryptography; telecommunication security; wireless sensor networks; LBK; LTE; bogus data injection attack; compromise-tolerant security; cryptographic concept; geographic location; location-based key; location-based threshold-endorsement scheme; neighborhood authentication scheme; network scalability; pairing; wireless sensor network; Authentication; Computer networks; Cryptography; Data security; Intrusion detection; National security; Resilience; Routing; Scalability; Wireless sensor networks; Compromise tolerance; location; pairing; security; wireless sensor networks;
fLanguage :
English
Journal_Title :
Selected Areas in Communications, IEEE Journal on
Publisher :
ieee
ISSN :
0733-8716
Type :
jour
DOI :
10.1109/JSAC.2005.861382
Filename :
1589106
Link To Document :
بازگشت