An algorithmic framework for robust access control in wireless sensor networks

被引:7
作者
Benenson, Z [1 ]
Gärtner, FC [1 ]
Kesdogan, D [1 ]
机构
[1] Rhein Westfal TH Aachen, Rhein Westfal TH Aachen, Dept Comp Sci, D-5100 Aachen, Germany
来源
PROCEEDINGS OF THE SECOND EUROPEAN WORKSHOP ON WIRELESS SENSOR NETWORKS | 2005年
关键词
D O I
10.1109/EWSN.2005.1462007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We first determine security issues in the context of access control in sensor networks especially focusing on the problem of node capture, i.e., the possibility that an attacker can completely take over some of the sensor nodes. We then introduce the notion of t-robust sensor networks which can withstand capture of up to t nodes and consider three basic security concepts for such networks: (1) t-robust storage, a mechanism to securely store data within a set of sensors such that capture of any t sensors does not reveal that data to the adversary; (2) n-authentication which ensures that authentication is achieved with every uncompromised sensor in the broadcast range of a client (n denotes the number of nodes in that broadcast range); and (3) n-authorization, an authorization primitive with similar properties like n-authentication. We present a generic t-robust protocol for implementing access control using these primitives.
引用
收藏
页码:158 / 165
页数:8
相关论文
共 20 条
[1]  
[Anonymous], 2002, PROCEEDING NETWORK D
[2]  
Benenson Z., 2004, INF 2004 WORKSH SENS
[3]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[4]  
DENG J, 2003, 2 IEEE INT WORKSH IN
[5]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[6]  
HERLIHY MP, 1988, LECT NOTES COMPUT SC, V293, P379
[7]   MICA: A wireless platform for deeply embedded networks [J].
Hill, JL ;
Culler, DE .
IEEE MICRO, 2002, 22 (06) :12-24
[8]  
Kong J., 2001, P 9 INT C NETW PROT
[9]  
MALAN DJ, 2004, 1 IEEE INT C SENS AD
[10]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH