The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
- 28 October 2010
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Parallel and Distributed Systems
- Vol. 23 (5), 958-965
- https://doi.org/10.1109/tpds.2010.185
Abstract
Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.Keywords
This publication has 18 references indexed in Scilit:
- Key Distribution Techniques for Sensor NetworksPublished by Springer Science and Business Media LLC ,2006
- Intelligent fluid infrastructure for embedded networksPublished by Association for Computing Machinery (ACM) ,2004
- LEAPPublished by Association for Computing Machinery (ACM) ,2003
- Routing security in wireless ad hoc networksIEEE Communications Magazine, 2002
- The Sybil AttackLecture Notes in Computer Science, 2002
- Wireless sensor networks: a surveyComputer Networks, 2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- Directed diffusionPublished by Association for Computing Machinery (ACM) ,2000
- Perfectly-Secure Key Distribution for Dynamic ConferencesLecture Notes in Computer Science, 1993
- Password authentication with insecure communicationCommunications of the ACM, 1981