Sensor Authentication in Collaborating Sensor Networks

被引:0
|
作者
Bielefeldt, Jake [1 ]
Chellappan, Sriram [1 ]
机构
[1] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO 65409 USA
来源
2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET) | 2014年
关键词
Sensor Networks; Collaboration; Authentication; Physically Unclonable Functions; Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O-i of Sensor Network S-i to correctly determine the number of active sensors in Network S-i. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first paper that addresses a practical security problem in collaborating sensor networks.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] A Robust Authentication Scheme With Continuously Updated Information for Vehicular Sensor Networks
    Liu, Xin
    Zhang, Ruisheng
    IEEE ACCESS, 2018, 6 : 70473 - 70486
  • [42] Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures
    Suganthi, S. D.
    Anitha, R.
    Thanalakshmi, P.
    DIGITAL CONNECTIVITY - SOCIAL IMPACT, 2016, 679 : 155 - 168
  • [43] Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks
    Chandra Sekhar Vorugunti
    Bharavi Mishra
    Ruhul Amin
    Rakesh P. Badoni
    Mrudula Sarvabhatla
    Dheerendra Mishra
    Wireless Personal Communications, 2017, 95 : 3141 - 3166
  • [44] THE IMPACT OF MOBILITY MODELS ON THE PERFORMANCE OF AUTHENTICATION SERVICES IN WIRELESS SENSOR NETWORKS
    Almomani, Iman
    Sundus, Katrina
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2020, 6 (01): : 75 - 93
  • [45] Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks
    Das, Manik Lal
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 240 - 245
  • [46] An enhanced two-factor user authentication in wireless sensor networks
    Jian-Jun Yuan
    Telecommunication Systems, 2014, 55 : 105 - 113
  • [47] Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks
    Xiong, Kaiqi
    Wang, Ronghua
    Du, Wenliang
    Ning, Peng
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 8 (03)
  • [48] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [49] Enhanced Lightweight Medical Sensor Networks Authentication Scheme Based on Blockchain
    Kang, Taewoong
    Woo, Naryun
    Ryu, Jihyeon
    IEEE ACCESS, 2024, 12 : 35612 - 35629
  • [50] Message and its origin authentication protocol for data aggregation in sensor networks
    Lee, HongKi
    Nyang, DaeHun
    Song, JooSeok
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 281 - 290