Abstract
We introduce the concept of secure overlays over static key distribution schemes to enable the use of mobile base stations for secure data querying in wireless sensor networks. Secure overlays are key distributions initialized from fixed initialization points, allowing queries to be inserted anywhere in the network. We thereby overcome the need for re-keying when a base station moves, at the cost that a query only spreads in a limited part of the network along the key distribution.
On the example of a layered key distribution and a query dissemination protocol we argue that the use of only a few secure overlays can compensate for that artifact. Queries sent from within the area defined by the initialization points reach a significant part of the sensor nodes within the first few hops.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Önen, M., Molva, R.: Secure data aggregation with multiple encryption. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol. 4373, pp. 117–132. Springer, Heidelberg (2007)
Rodhe, I., Rohner, C., Achtzehn, A.: n-LQA: n-layers query authentication in sensor networks. In: Proceedings of the 3rd IEEE International Workshop on Wireless and Sensor Networks Security (2007)
Jayaraman, P.P., Zaslavsky, A., Delsing, J.: Sensor data collection using heterogeneous mobile devices. In: IEEE International Conference on Pervasive Services (2007)
Ren, B., Ma, J., Chen, C.: The hybrid mobile wireless sensor networks for data gathering. In: IWCMC’06: Proceedings of the 2006 international conference on Wireless communications and mobile computing, pp. 1085–1090. ACM, New York (2006)
Hou, T., Li, V.: Transmission range control in multihop packet radio networks. IEEE Transactions on Communications 34(1), 38–44 (1986)
Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wireless Networks 10(2), 169–181 (2004)
Armknecht, F., Girao, J., Stoecklin, M., Westhoff, D.: Re-visited: Denial of service resilient access control for wireless sensor networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 18–31. Springer, Heidelberg (2006); Held in conjunction with ESORICS 2006
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: MOBIQUITOUS’05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (2005)
Benenson, Z., Gedicke, N., Raivio, O.: Realizing robust user authentication in sensor networks. In: Workshop on Real-World Wireless Sensor Networks (REALWSN), Stockholm (2005)
Mykletun, E., Girao, J., Westhoff, D.: Public key based cryptoschemes for data concealment in wireless sensor networks. In: IEEE International Conference on Communications, ICC 2006 (2006)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS’02: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM, New York (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rodhe, I., Rohner, C. (2010). Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs. In: Osipov, E., Kassler, A., Bohnert, T.M., Masip-Bruin, X. (eds) Wired/Wireless Internet Communications. WWIC 2010. Lecture Notes in Computer Science, vol 6074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13315-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-13315-2_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13314-5
Online ISBN: 978-3-642-13315-2
eBook Packages: Computer ScienceComputer Science (R0)