A study on sensor nodes attestation protocol in a Wireless Sensor Network

被引:0
|
作者
Choi, Yong-Sik [1 ]
Jeon, Young-Jun [1 ]
Park, Sang-Hyun [1 ]
机构
[1] Univ Incheon, Dept Comp Sci & Engn, 12-1 SongDo Dong, Incheon, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
Sensor node; attestation Wireless network; SOFTWARE-BASED ATTESTATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A sensor network is applied to various fields from the special application fields such as wild environment monitoring, industrial machine measurement, and military-purpose measurement to the daily application fields such as fire monitoring and pollution monitoring. A Wireless Sensor Network is a wire and wireless network, which consists of several sensor nodes deployed in a certain field. A sensor node should have computation, sensing and wireless communication functions. A sensor network has a limited computing and communication resource. To overcome this barrier, collaboration with surrounding nodes is required. In other words, information sharing between hierarchies is required rather than a hierarchical approach. A sensor network generally consists of a large number of sensor nodes for exact sensing and extendibility of the sensing areas. Therefore, attackers can easily capture sensor nodes. And an attacker is able to attack the sensor node itself and the sensor network through a modified attack on sensor nodes. Therefore, the security of a sensor network is important. The attestation for sensor nodes suggested by this paper consists of 2 steps. STEP 1. Inter-connective attestation between surrounding sensor nodes STEP 2. If there is any abnormality, the node notifies the BS (Base Station) and requests attestation as to whether there is a damaged node or not. Initial sensor node attestation is carried out by inter-connective sensor nodes, not by the BS. If there is any abnormality, the node notifies the BS. And BS carries out attestation for node showing abnormality. Attestation for the BS and sensor node uses an authentication protocol method for preventing nodes from being captured. As mentioned above, because there is a periodic simple attestation procedure between sensor nodes and sensor node attestation, it is easy and rapid to identify which is captured by attacker; thus, a secure sensor network is attainable.
引用
收藏
页码:574 / 579
页数:6
相关论文
共 50 条
  • [1] Lightweight Attestation Scheme for Wireless Sensor Network
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 25 - 40
  • [2] Overview of sensor nodes in wireless sensor network
    Xian Hao
    Zhang Jilong
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3606 - 3609
  • [3] Memory Attestation of Wireless Sensor Nodes by Trusted Local Agents
    Yang, Po-Hung
    Yen, Sung-Ming
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 82 - 89
  • [4] A performance study of mobile nodes in a Wireless Sensor Network
    Mouawad, Antoinette
    Chalhoub, Gerard
    Habib, Gilbert
    Misson, Michel
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 136 - 140
  • [5] Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network
    Awwad, Samer A. B.
    Chee Kyun Ng
    Noordin, Nor K.
    Rasid, Mohd Fadlee A.
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (02) : 251 - 281
  • [6] Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network
    Samer A. B. Awwad
    Chee Kyun Ng
    Nor K. Noordin
    Mohd. Fadlee A. Rasid
    Wireless Personal Communications, 2011, 61 : 251 - 281
  • [7] Cluster Based Routing Protocol for Mobile Nodes in Wireless Sensor Network
    Awwad, Samer A. B.
    Ng, Chee K.
    Noordin, Nor K.
    Rasid, Mohd. Fadlee A.
    PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 233 - 241
  • [8] Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes
    Alam, Md. Nasre
    Kim, Young-Chon
    JOURNAL OF SENSORS, 2016, 2016
  • [9] Memory attestation of wireless sensor nodes through trusted remote agents
    Yang, Po-Hung
    Yen, Sung-Ming
    IET INFORMATION SECURITY, 2017, 11 (06) : 338 - 344
  • [10] Compromised nodes in wireless sensor network
    Lin, ZT
    Qu, YG
    Jing, L
    Zhao, BH
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 224 - 230