A novel node level security policy framework for wireless sensor networks

被引:34
作者
Claycomb, William R. [1 ]
Shin, Dongwan [1 ]
机构
[1] New Mexico Inst Min & Technol, Secure Comp Lab, Socorro, NM 87801 USA
基金
美国国家科学基金会;
关键词
Security application for sensor networks; Security policy; Identity based cryptography;
D O I
10.1016/j.jnca.2010.03.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks are commonly used for critical security tasks such as intrusion or tamper detection, and therefore must be protected. To date, security of these networks relies mostly on key establishment and routing protocols. We present an approach to protecting wireless sensor networks based on a security policy, enforced at the node level. This policy is based on a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables nodes to authenticate each other, and provides them with a structure to build secure communications between one another, and between various groups. Using our key establishment protocol and security policy, we show how to reduce or prevent significant attacks on wireless sensor networks. (c) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:418 / 428
页数:11
相关论文
共 27 条
[1]  
Amtel Corporation, 2009, AMT ATMEGA128
[2]  
[Anonymous], 2008, CC2420
[3]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[4]  
[Anonymous], 2005, COMPUTING TATE PAIRI
[5]  
[Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Crossbow Technology, 2009, IMOTE2
[8]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[9]  
Du W., 2004, IEEE INFOCOM, V1, P597
[10]   Reputation-based framework for high integrity sensor networks [J].
Ganeriwal, Saurabh ;
Balzano, Laura K. ;
Srivastava, Mani B. .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)