Abstract
Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security mechanisms would be hard to satisfy the security/cost requirements of all types of nodes. In this paper, we propose an integrated security approach, called Hybrid Security Scheme (HSS). It splits a WSAN into two layers, the sink-actor layer and the actor-sensor layer, according to nodes’ functionalities and capacities. Different security mechanisms are provided to achieve the security services at corresponding levels. Furthermore, an adaptive switching mechanism is provided to satisfy the dynamic topology of network, and several methods are also used to reduce the system costs.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Kasimoglu, I.H.: Wireless Sensor and Actor Networks: Research Challenges. Ad Hoc Networks Journal (Elsevier) 2(4), 351–367 (2004)
Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. of 2003 IEEE Symposium on Research in Security and Privacy, pp. 197–213 (May 2003)
Dutertre, B., Cheung, S., Levy, J.: Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust. SDL Technical Report SRI-SDL-04-02, April 6 (2004)
Eschenauer, L., Gligor, V.D.: A key-Management Scheme for Distributed Sensor Networks. In: CCS 2002, Washington, DC,USA (November 2002)
Hu, F., Sharma, N.K.: Security Considerations in Ad Hoc Sensor Networks. Ad Hoc Networks 3, 69–89 (2005)
Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA (October 2001)
Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M., Lu, S.: Adaptive Security for Multi-layer Ad-hoc Networks. In: Special Issue of Wireless Communications and Mobile Computing. Wiley Interscience Press, Hoboken (2002)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE ICNP (2001)
Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report 200030, UCLA Computer Science Department (2000)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-Securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications, ISCC 2002 (2002)
Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13(6), 38–43 (1999)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: MobiCom 2001, pp. 189–199 (July 2001)
Suh, E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: 17th International Conference on Supercomputing(ICS 2003) (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cao, X., Huang, M., Chen, Y., Chen, G. (2005). Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. ISPA 2005. Lecture Notes in Computer Science, vol 3759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576259_50
Download citation
DOI: https://doi.org/10.1007/11576259_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29770-3
Online ISBN: 978-3-540-32115-6
eBook Packages: Computer ScienceComputer Science (R0)