ABSTRACT
The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes.
In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.
Recommendations
Multi-sender Broadcast Authentication in Wireless Sensor Networks
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityBroadcast authentication, a fundamental feature in wireless sensor networks (WSNs), enables users to broadcast to multiple sensor nodes in an authenticated way. Symmetric-key-based muTESLA-like schemes are a popular solution due to their energy ...
User Authentication for Hiererchical Wireless Sensor Networks
SNPD '13: Proceedings of the 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed ComputingWireless sensor networks (WSNs) have a vast field of applications, including environment monitoring, battlefield surveillance and target tracking systems. As WSNs are usually deployed in remote or hostile environments and nodes are prone to compromise ...
Fast authentication in wireless sensor networks
Broadcast authentication is a fundamental security service in wireless sensor networks (WSNs). Although symmetric-key-based µ TESLA -like schemes were employed due to their energy efficiency, they all suffer from DoS attacks resulting from the nature of ...
Comments