Online citations, reference lists, and bibliographies.
← Back to Search

Location-based Compromise-tolerant Security Mechanisms For Wireless Sensor Networks

Yanchao Zhang, Wei E. I. Liu, W. Lou, Yuguang Fang
Published 2006 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.
This paper references
Public keys cryptography in sensor networks
G. Gaubatz (2004)
10.1109/PERCOM.2005.18
Energy analysis of public-key cryptography for wireless sensor networks
Arvinderpal Wander (2005)
10.1145/958491.958521
SIA: secure information aggregation in sensor networks
H. Chan (2003)
10.1007/s11276-006-9958-8
On k−coverage in a mostly sleeping sensor network
S. Kumar (2008)
10.1109/WCNC.2005.1424813
LLK: a link-layer key establishment scheme for wireless sensor networks
Yun Zhou (2005)
10.1007/3-540-44647-8_13
Identity-Based Encryption from the Weil Pairing
D. Boneh (2001)
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
Y. Hu (2001)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
D. Liu (2003)
10.1145/1023646.1023650
SeRLoc: secure range-independent localization for wireless sensor networks
L. Lazos (2004)
Fang is a member of the
Dr
10.1145/1065545.1065548
A pairwise key predistribution scheme for wireless sensor networks
W. Du (2005)
GPSR : Greedy Perimeter Stateless Routing for Wireless
B. Karp (2000)
10.1109/CSFW.2003.1212715
Identity based authenticated key agreement protocols from pairings
Liqun Chen (2003)
10.1109/SECPRI.2004.1301328
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S. Zhu (2004)
10.1109/INFCOM.2004.1354662
SPREAD: enhancing data confidentiality in mobile ad hoc networks
W. Lou (2004)
Computing Tate Pairing on Smartcards
G. Bertoni (2005)
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
D. W. Carman (2000)
10.1002/wcm.422
Security in wireless sensor networks
V. C. Giruka (2008)
10.1007/3-540-45748-8_24
The Sybil Attack
John R. Douceur (2002)
The Sybil attack Workshop on Peer-to- Peer Syst
J R Douceur (2002)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1145/1029102.1029110
Location-aware key management scheme for wireless sensor networks
Dijiang Huang (2004)
Intel PXA255 Processor Electrical, Mechanical, and Thermal Specification
10.1145/501436.501438
Secure pebblenets
S. Basagni (2001)
10.1109/ITCC.2004.1286437
Identity-based threshold signature scheme from the bilinear pairings (extended abstract)
Joonsang Baek (2004)
10.1109/IPSN.2005.1440904
Attack-resistant location estimation in sensor networks
D. Liu (2005)
10.1109/INFCOM.2003.1209219
Packet leashes: a defense against wormhole attacks in wireless networks
Y. Hu (2003)
10.1145/948109.948119
Establishing pairwise keys in distributed sensor networks
D. Liu (2003)
10.1145/844193.844196
Habitat monitoring: application driver for wireless communications technology
A. Cerpa (2001)
10.1145/1218556.1218559
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2006)
Intel PXA 255 Processor Electrical , Mechanical , and Thermal Specification . ” [ Online ]
L. Chen G. Bertoni
10.1007/978-3-540-28632-5_9
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
N. Gura (2004)
10.1109/SAHCN.2004.1381904
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
D. Malan (2004)
10.1109/IPSN.2004.1307346
The sybil attack in sensor networks: analysis & defenses
J. Newsome (2004)
10.1145/1029102.1029113
TinyPK: securing sensor networks with public key technology
Ronald J. Watro (2004)
10.1007/978-3-540-24654-1_2
On the Selection of Pairing-Friendly Groups
Paulo S. L. M. Barreto (2003)
10.3233/JCS-2007-15104
SIA: Secure information aggregation in sensor networks
H. Chan (2007)
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
10.1145/986858.986869
Location-based pairwise key establishments for static sensor networks
D. Liu (2003)
10.1145/1066116.1066123
Energy aware lossless data compression
K. Barr (2003)
Identity-Based Threshold Signature from the Bilinear Pairings
Joonsang Baek (2004)
10.1007/3-540-45708-9_23
Efficient Algorithms for Pairing-Based Cryptosystems
Paulo S. L. M. Barreto (2002)
10.1007/978-3-540-30574-3_20
Computing the Tate Pairing
M. Scott (2005)
and the M.E. degree in computer applications from Beijing University of Posts and Telecommunications
(1999)
10.1109/INFCOM.2005.1498470
Secure positioning of wireless devices with application to sensor networks
Srdjan Capkun (2005)
10.1109/WCNC.2005.1424678
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L. Lazos (2005)
Computing tate pairing on smartcards , ” White Paper , STMicroelectronics , 2005
N. Gura A. Wander
10.1109/MILCOM.2005.1606144
Secure localization in wireless sensor networks
Y. Zhang (2005)
Digital hash standard Federal Information Processing Standards PUBlication 180-1
(1995)
Digital hash standard
NIST (1995)
SPINS : Security Protocols for Sensor Networks
Jeffery Undercoffer (2002)
Computing Tate pairing on smartcards White Paper STMicroelectronics
G Bertoni (2005)
10.1007/3-540-39568-7_5
Identity-Based Cryptosystems and Signature Schemes
A. Shamir (1984)
10.1007/11545262_30
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three
T. Kerins (2005)
10.1145/359168.359176
How to share a secret
A. Shamir (1979)
10.1109/JSAC.2005.843561
Statistical en-route filtering of injected false data in sensor networks
Fan Ye (2005)
10.1109/INFCOM.2004.1354530
A key management scheme for wireless sensor networks using deployment knowledge
W. Du (2004)
10.1109/IPDPS.2005.267
LAD: localization anomaly detection for wireless sensor networks
W. Du (2005)
10.1109/SNPA.2003.1203362
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
10.1145/948109.948118
A pairwise key pre-distribution scheme for wireless sensor networks
W. Du (2003)
10.1007/3-540-36492-7_20
Efficient Identity Based Signature Schemes Based on Pairings
F. Hess (2002)



This paper is referenced by
Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication
Shital Y. Gaikwad (2013)
Detecting of Materialize Topical Trend Topic from Social Networks
(2015)
10.1016/j.comnet.2009.07.013
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
K. Ssu (2009)
10.1109/ICII.2019.00071
Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet
Songlin Chen (2019)
10.1007/11814856_48
On Broadcast Authentication in Wireless Sensor Networks
K. Ren (2007)
10.1109/TCOMM.2011.072611.100047
Inter-Domain Path Provisioning with Security Features: Architecture and Signaling Performance
S. G. Polito (2011)
10.5772/15670
Distance Estimation based on 802.11 RTS/CTS Mechanism for Indoor Localization
A. Bahillo (2011)
10.2174/2352096512666190215125026
Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack
Vandana Mohindru (2020)
10.1109/ICWMC.2010.48
Implementation of an Advanced Authentication Method within Microsoft Active Directory Network Services
Jaroslav Kadlec (2010)
Key Management Scheme for Wireless Sensor Networks Based on Deployment Knowledge
Sun Yu-geng (2009)
A ROBUST APPROACH TOWARDS SECURE NEIGHBOR DISCOVERY FOR WIRELESS AD HOC NETWORKS
S. Taheri (2012)
10.14445/22312803/IJCTT-V13P123
Secure Routing using Multiple Domains for Wireless Sensor Networks
T LataB. (2014)
AN EFFICIENT SAFE ROUTING FOR FORGED DATA IN WIRELESS SENSOR NETWORKS
Nithin Gopinath (2013)
Physical layer secret key generation for decentralized wireless networks
Iulia Tunaru (2015)
Intrusion Detection in Wireless Sensor Networks
M. Krishnan (2006)
Bayesian methods for modelling and management of trust in wireless sensor networks
M. Momani (2008)
10.1177/1550147718765980
A novel wireless visual sensor network protocol based on LoRa modulation
Chunlei Fan (2018)
10.1109/ICDCS.2009.10
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
D. Liu (2009)
10.2991/CSSS-14.2014.119
Security in Next-Generation Wireless Sensor Networks
Gao Li-jie (2014)
10.1109/TWC.2007.060255
On Broadcast Authentication in Wireless Sensor Networks
K. Ren (2007)
10.1109/GLOCOMW.2008.ECP.41
Adaptive Confidentiality Mechanism for Hierarchical Wireless Sensor Networks
M. Al (2008)
10.1142/S0129054113500214
A Novel Efficient Access Control Scheme for Large-Scale Distributed Wireless Sensor Networks
A. K. Das (2013)
Secure routing in multi-hop wireless networks
J. Zhou (2012)
Statistical En-Route Filtering of Fabricated Reports in Ubiquitous Sensor Networks Based on Commutative Cipher
H. Lee (2008)
10.1109/SARNOF.2007.4567365
Securing resource-constrained wireless ad hoc networks
Yuguang Fang (2007)
10.1109/TIFS.2017.2668062
BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
Kyung-Ah Shim (2017)
10.1109/MCOM.2008.4481351
Detecting and avoiding wormhole attacks in wireless ad hoc networks
Farid Naït-Abdesselam (2008)
10.1109/WARTIA.2014.6976405
Key-management scheme based on identity and cluster layer in wireless sensor network
L. Zheng (2014)
10.1109/ICC.2012.6364441
All your jammers belong to us — Localization of wireless sensors under jamming attack
Yu Seung Kim (2012)
Efficient and secure network services in wireless sensor networks
Min-gyu Cho (2009)
10.1109/WCICA.2010.5554887
A routing-driven key management scheme for heterogeneous wireless sensor networks based on deployment knowledge
Juwei Zhang (2010)
Providing High Security For Wsn’s Using Distributed Hash Table (Dht)
Sarah M. Grace (2014)
See more
Semantic Scholar Logo Some data provided by SemanticScholar