Skip to main content

Hybrid Authentication and Key Management Scheme for WSANs

  • Conference paper
Parallel and Distributed Processing and Applications - ISPA 2005 Workshops (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3759))

Abstract

Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security mechanisms would be hard to satisfy the security/cost requirements of all types of nodes. In this paper, we propose an integrated security approach, called Hybrid Security Scheme (HSS). It splits a WSAN into two layers, the sink-actor layer and the actor-sensor layer, according to nodes’ functionalities and capacities. Different security mechanisms are provided to achieve the security services at corresponding levels. Furthermore, an adaptive switching mechanism is provided to satisfy the dynamic topology of network, and several methods are also used to reduce the system costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Kasimoglu, I.H.: Wireless Sensor and Actor Networks: Research Challenges. Ad Hoc Networks Journal (Elsevier) 2(4), 351–367 (2004)

    Article  Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. of 2003 IEEE Symposium on Research in Security and Privacy, pp. 197–213 (May 2003)

    Google Scholar 

  3. Dutertre, B., Cheung, S., Levy, J.: Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust. SDL Technical Report SRI-SDL-04-02, April 6 (2004)

    Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-Management Scheme for Distributed Sensor Networks. In: CCS 2002, Washington, DC,USA (November 2002)

    Google Scholar 

  5. Hu, F., Sharma, N.K.: Security Considerations in Ad Hoc Sensor Networks. Ad Hoc Networks 3, 69–89 (2005)

    Article  Google Scholar 

  6. Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA (October 2001)

    Google Scholar 

  7. Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M., Lu, S.: Adaptive Security for Multi-layer Ad-hoc Networks. In: Special Issue of Wireless Communications and Mobile Computing. Wiley Interscience Press, Hoboken (2002)

    Google Scholar 

  8. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE ICNP (2001)

    Google Scholar 

  9. Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report 200030, UCLA Computer Science Department (2000)

    Google Scholar 

  10. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-Securing Ad Hoc Wireless Networks. In: Seventh IEEE Symposium on Computers and Communications, ISCC 2002 (2002)

    Google Scholar 

  11. Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13(6), 38–43 (1999)

    Article  Google Scholar 

  12. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: MobiCom 2001, pp. 189–199 (July 2001)

    Google Scholar 

  13. Suh, E., Clarke, D., Gassend, B., van Dijk, M., Devadas, S.: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In: 17th International Conference on Supercomputing(ICS 2003) (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, X., Huang, M., Chen, Y., Chen, G. (2005). Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. ISPA 2005. Lecture Notes in Computer Science, vol 3759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576259_50

Download citation

  • DOI: https://doi.org/10.1007/11576259_50

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29770-3

  • Online ISBN: 978-3-540-32115-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics