Sensor Authentication in Collaborating Sensor Networks

被引:0
|
作者
Bielefeldt, Jake [1 ]
Chellappan, Sriram [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
来源
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET) | 2014年
关键词
Sensor Networks; Collaboration; Authentication; Physically Unclonable Functions; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O-i of Sensor Network S-i to correctly determine the number of active sensors in Network S-i. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first paper that addresses a practical security problem in collaborating sensor networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, A.L.
    World Academy of Science, Engineering and Technology, 2010, 42 : 630 - 636
  • [22] User authentication scheme for sensor networks
    Wang Xiaoming
    Yao Guoxiang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [23] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [24] Multihop Node Authentication Mechanisms for Wireless Sensor Networks
    Mansour, Ismail
    Rusinek, Damian
    Chalhoub, Gerard
    Lafourcade, Pascal
    Ksiezopolski, Bogdan
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, ADHOC-NOW 2014, 2014, 8487 : 402 - +
  • [25] Enhancing Broadcast Authentication in Sensor Networks
    Norouzi, Arayeh
    Abhari, Abdolreza
    Yang, Truman
    14TH COMMUNICATIONS AND NETWORKING SYMPOSIUM 2011 (CNS 2011) - 2011 SPRING SIMULATION MULTICONFERENCE - BK 3 OF 8, 2011, : 125 - 132
  • [26] An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks
    He, Daojing
    Gao, Yi
    Chan, Sammy
    Chen, Chun
    Bu, Jiajun
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (04) : 361 - 371
  • [27] A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks
    Li, Xiong
    Niu, Jianwei
    Choo, Kim-Kwang Raymond
    RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY, 2017, 10155 : 30 - 44
  • [28] Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks
    Youn, Seongwook
    Cho, Hyun-chong
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2017, 12 (03) : 1307 - 1313
  • [29] An authentication scheme for filtering injected bogus data in sensor networks
    Kim, Yong Ho
    Lee, Dong Hoon
    COMPUTER COMMUNICATIONS, 2008, 31 (17) : 3929 - 3932
  • [30] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899