Skip to main content

A Secure Message Percolation Scheme for Wireless Sensor Network

  • Conference paper
Information Networking. Towards Ubiquitous Networking and Services (ICOIN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5200))

Included in the following conference series:

Abstract

Wireless Sensor Network (WSN) deployed in hostile environments suffers from severe security threats. In this paper, we propose a Secure Message Percolation (SMP) scheme for WSN. We engineer a secure group management scheme for dealing with data gathered by groups of co-located sensors and analyze the robustness against increasing number of compromised sensor nodes. Key pre-distribution is performed with the concept of star key graph where one sensor node dominates other nodes. Analytical result shows that our protocol is robust against node compromise attack and scales well and requires a few pre-distributed shared keys per node.

This work was supported by MIC and ITRC Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Garey, M.L., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, San Francisco (1979)

    MATH  Google Scholar 

  2. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)

    Google Scholar 

  3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  4. Erdos, Renyi: On Random Graphs. Publ. Math. Debrecen 6, 290–297 (1959)

    MathSciNet  MATH  Google Scholar 

  5. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE Journal on Selected Areas in Communications 23(4), 839–850 (2005)

    Article  Google Scholar 

  6. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, March 30- April 3, 2003, vol. 3, pp. 1976–1986 (2003)

    Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)

    Google Scholar 

  9. Oniz, C.C., Tasci, S.E., Savas, E., Ercetin, O., and Levi, A.: SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks, http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf

  10. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, May 11-14, 2003, pp. 197–213 (2003)

    Google Scholar 

  11. Karakehayov, Z.: Using REWARD to detect team black-hole attacks in wireless sensor networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 20-21 (2005)

    Google Scholar 

  12. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  13. Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  MATH  Google Scholar 

  14. Chen, Y.P., Liestman, A.L.: A Zonal Algorithm for Clustering Ad Hoc Networks. International Journal of Foundations of Computer Science 14(2), 305–322 (2003)

    Article  MATH  Google Scholar 

  15. Liu, D., Ning, P., Du., W.: Group-Based Key Pre-Distribution in Wireless Sensor Networks. In: Proc. ACM WiSE 2005, September 2 (2005)

    Google Scholar 

  16. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. Auerbach Publications, CRC Press (2006)

    Google Scholar 

  17. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communications using Key Graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hamid, M.A., Hong, C.S. (2008). A Secure Message Percolation Scheme for Wireless Sensor Network. In: Vazão, T., Freire, M.M., Chong, I. (eds) Information Networking. Towards Ubiquitous Networking and Services. ICOIN 2007. Lecture Notes in Computer Science, vol 5200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89524-4_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89524-4_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89523-7

  • Online ISBN: 978-3-540-89524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics