Abstract
Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We engineer a secure group management scheme for dealing with data gathered by groups of co-located sensors and analyze the robustness against increasing number of compromised sensor nodes. Key pre-distribution is performed with the concept of star key graph where one sensor node dominates other nodes. Analytical result shows that our protocol is robust against node compromise attack and scales well and requires a few pre-distributed shared keys per node.
This work was supported by MIC and ITRC Project.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Garey, M.L., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco (1979)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)
Erdos, Renyi: On Random Graphs. Publ. Math. Debrecen 6, 290–297 (1959)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications 23(4), 839–850 (2005)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, March 30- April 3, 2003, vol. 3, pp. 1976–1986 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)
Oniz, C.C., Tasci, S.E., Savas, E., Ercetin, O., and Levi, A.: SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks, http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14, 2003, pp. 197–213 (2003)
Karakehayov, Z.: Using REWARD to detect team black-hole attacks in wireless sensor networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 20-21 (2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Chen, Y.P., Liestman, A.L.: A Zonal Algorithm for Clustering Ad Hoc Networks. International Journal of Foundations of Computer Science 14(2), 305–322 (2003)
Liu, D., Ning, P., Du., W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. ACM WiSE 2005, September 2 (2005)
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. Auerbach Publications, CRC Press (2006)
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications using Key Graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hamid, M.A., Hong, C.S. (2008). A Secure Message Percolation Scheme for Wireless Sensor Network. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_55
Download citation
DOI: https://doi.org/10.1007/978-3-540-89524-4_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89523-7
Online ISBN: 978-3-540-89524-4
eBook Packages: Computer ScienceComputer Science (R0)