Abstract
While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a COmpromised nOde Locating protocol for detecting and locating compromised nodes once they misbehave in the sensor network. We exploit a proven collision-resilient incremental hashing algorithm and design secure steps to confidently locate compromised nodes. The scheme can also be combined with existing en-route false report filtering schemes to achieve both early false report dropping and accurate compromised nodes isolation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Micciancio, D.: A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163–192. Springer, Heidelberg (1997)
Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: a Scalable and Robust Communication in Wireless Sensor Networks. In: 5th IEEE/ACM Mobicom, pp. 174–185 (1999)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy (2003)
Chew, P., Marzullo, K.: Masking Failures of Multidimensional Sensors. In: Proc. of the 10th Symposium on Reliable Distributed Systems, pp. 32–41 (1991)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Transactions on Wireless Communications 1(4), 660–670 (2002)
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. In: ASPLOS IX (2000)
Jaikaeo, C., Srisathapornphat, C., Shen, C.: Diagnosis of Sensor Networks. In: IEEE international Conference on Communications (June 2001)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: IEEE international workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proc. ACM CCS (2003)
Marzullo, K.: Tolerating Failures of Continuous-valued Sensors. ACM Transactions on Computer Systems (November 1990)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: MOBICOM (2000)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: Proc. of Seventh Annual International Conference on Mobile Computing and Networks (2001)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley, Chichester (1996)
Wang, G., Zhang, W., Cao, G., Porta, T.L.: On Supporting Distributed Collaboration in Sensor Networks. In: IEEE MILCOM (2003)
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for Some Hash Functions MD4, MD5, HAVAL-128, RIPEMD. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152. Springer, Heidelberg (2004)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In: IEEE INFOCOM 2004 (2004)
Younis, O., Fahmy, S.: Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid, Energy-Efficient Approach. In: INFOCOM (2004)
Zhang, Y., Yang, J., Jin, L., Li, W.: Locating Compromised Sensor Nodes through Incremental Hashing Authentication. Technical Report, University of Pittsburgh (2006)
Zhang, W., Cao, G.: Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach. In: INFOCOM (2005)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California (May 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Yang, J., Jin, L., Li, W. (2006). Locating Compromised Sensor Nodes Through Incremental Hashing Authentication. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds) Distributed Computing in Sensor Systems. DCOSS 2006. Lecture Notes in Computer Science, vol 4026. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11776178_20
Download citation
DOI: https://doi.org/10.1007/11776178_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-35227-3
Online ISBN: 978-3-540-35228-0
eBook Packages: Computer ScienceComputer Science (R0)