Securing Sensor Reports in Wireless Sensor Networks*

  • Al-Sakib Khan Pathan
  • Choong Seon Hong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4641)

Abstract

The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. Hence, classifying real and false sensor reports is necessary to avoid unwanted results. In this paper, we propose a scheme for securing the sensor reports in a wireless sensor network. We use one-way hash chain and pre-stored shared secret keys to provide data transmission security for the reports that travel from any source node to the base station. To introduce data freshness, our scheme includes an optional key refreshment mechanism which could be applied depending upon the requirement or the application at hand. We present an analysis along with the detailed description of our scheme.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Kasimoglu, I.H.: Wireless Sensor and Actor Networks: Research Challenges. Ad Hoc Networks 2(4), 351–367 (2004)CrossRefGoogle Scholar
  2. 2.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38, 393–422 (2002)CrossRefGoogle Scholar
  3. 3.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Journal on Sel. Areas in Comm. 23(4), 839–850 (2005)CrossRefGoogle Scholar
  4. 4.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of S&P, pp. 259–271 (2004)Google Scholar
  5. 5.
    Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Xbow Sensor Networks, available at: http://www.xbow.com/
  7. 7.
    Lamport, L.: Constructing digital signatures from one-way function. In technical report SRI-CSL-98, SRI International (October 1979)Google Scholar
  8. 8.
    Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proc. of the 8th IEEE ICACT 2006, vol. II, pp. 1043–1048. IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  9. 9.
    Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE RTSS, pp. 286–297. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  10. 10.
    Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: 6th International Financial Cryptography, Bermuda (March 2002)Google Scholar
  11. 11.
    Jakobsson, M.: Fractal hash sequence representation and traversal. In: 2002 IEEE International Symposium on Information Theory, Switzerland, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  12. 12.
    Sella, Y.: On the computation-storage trade-offs of hash chain traversal. In: 7th International Financial Cryptography Conference, Guadeloupe (2003)Google Scholar
  13. 13.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, 293–315 (September 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Al-Sakib Khan Pathan
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Department of Computer Engineering, Kyung Hee University, Giheung, Yongin, Gyeonggi, 449-701Korea

Personalised recommendations