Advertisement

ARMS: An Authenticated Routing Message in Sensor Networks

  • Suk-Bok Lee
  • Yoon-Hwa Choi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4074)

Abstract

In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a sensor node’s broadcast message should be authenticated by all its neighbors. Unfortunately, the previous work on broadcast authentication in sensor networks mainly concentrates on broadcast messages from a base station which has greater capabilities, not from a sensor node. Those schemes’ properties are not appropriate for broadcast authentication of sensor node’s routing messages. In this paper, we present ARMS, a protocol for broadcast authentication of sensor node’s routing messages. It requires only a small memory space, authenticates routing messages without delay (thus, no buffering is needed), needs no time synchronization among sensor nodes, and mitigates the effect of packet loss. These ARMS’ properties are suitable for a sensor node to broadcast an authenticated routing message.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Packet Loss Packet Loss Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (May 2003)Google Scholar
  2. 2.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security (CCS) (November 2002)Google Scholar
  3. 3.
    Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder (January 2005)Google Scholar
  4. 4.
    Heinzelman, W.R., Kulik, J., Balakrishnan, H.: Adaptive protocols for information dissemination in wireless sensor networks. In: Proceedings of the ACM MobiCom 1999, Seattle, Washington, pp. 174–185 (1999)Google Scholar
  5. 5.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: First IEEE InternationalWorkshop on Sensor Network Protocols and Applications (May 2003)Google Scholar
  6. 6.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)Google Scholar
  7. 7.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security (CCS) (October 2003)Google Scholar
  8. 8.
    Liu, D., Ning, P.: Multi-Level μ-TESLA: A Broadcast Authentication System for Distributed Sensor Networks (submitted for journal publication); Also available as Technical Report, TR-2003-08, North Carolina State University, Department of Computer Science (March 2003)Google Scholar
  9. 9.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (May 2000)Google Scholar
  10. 10.
    Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (February 2001)Google Scholar
  11. 11.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004) (Special Issue on Wireless sensor networks)CrossRefGoogle Scholar
  12. 12.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001) (2001)Google Scholar
  13. 13.
    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Suk-Bok Lee
    • 1
  • Yoon-Hwa Choi
    • 1
  1. 1.Department of Computer EngineeringHongik UniversitySeoulKorea

Personalised recommendations