A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks

被引:0
作者
Abdallah, Walid [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Carthage, Tunisia
来源
2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC) | 2016年
关键词
WSN; Security; Key management; Location-aware; elliptic-curve cryptography; identity-based encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A wireless sensor network (WSN) is generally deployed in an uncontrolled environment where it can be the target of many security attacks trying to compromise its normal operation. Consequently, providing security for data exchanged in a WSN is one of the main requirements to allow the accomplishment of its mission. This paper, proposes a location-aware key authentication and distribution mechanism to secure WSNs where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, public key authentication is based on the position of the sensor node in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code calculated on the corresponding public key using keys derived from encrypted beacons broadcast by anchor nodes. We show that the proposed public key authentication and distribution scheme is more resilient to node replication attack and generates less communication overhead than currently available location dependent schemes.
引用
收藏
页码:488 / 495
页数:8
相关论文
共 8 条
[1]  
Abdallah W., 2014, ICACT T ADV COMMUNIC, V3, P480
[2]   Location dependent key management in sensor networks without using deployment knowledge [J].
Anjum, Farooq .
WIRELESS NETWORKS, 2010, 16 (06) :1587-1600
[3]   New multiparty authentication services and key agreement protocols [J].
Ateniese, G ;
Steiner, M ;
Tsudik, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :628-639
[4]  
Boudriga N., 2014, INT J DISTRIB SENS N, V2014, P1
[5]  
In-Tai Kim, 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2010), P245, DOI 10.1109/ISSNIP.2010.5706740
[6]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[7]   A public-key infrastructure for key i)istribution in TinyOS based on elliptic curve cryptography [J].
Malan, DJ ;
Welsh, M ;
Smith, MD .
2004 FIRST ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2004, :71-80
[8]   A survey of key management schemes in wireless sensor networks [J].
Xiao, Yang ;
Rayi, Venkata Krishna ;
Sun, Bo ;
Du, Xiaojiang ;
Hu, Fei ;
Galloway, Michael .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2314-2341