Abstract
In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages but also for upstream messages among neighbors, and it solves the secret value update issue with multiple Merkle trees and unbalanced energy consumption among sensor nodes with graceful handover of aggregator. In treating compromised node problem, our protocol provides an equivalent security level of pair-wise key sharing scheme, while much less memory requirements compared to pair-wise key sharing scheme.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment), and supported by grant No. R01-2006-000-10957-0(2006) from the Basic Research Program of the Korea Science & Engineering Foundation.
Chapter PDF
References
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of the MOBICOM (2001)
Liu, D., Ning, P.: Multilevel μTESLA: Broadcast Authentication for Distributed Sensor Networks. ACM Transactions on Embedded Computing Systems 3(4), 800–836 (2004)
Liu, D., Ning, P., Zhu, S., Jajodia, S.: Practical Broadcast Authentication in Sensor Networks. In: Proceedings of the MobiQuitous (2005)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1980)
Heinzelman, W., Chandrakasan, A., Balakrshnan, H.: Energy-efficient communication protocol for wireless sensor network. In: Proceedings of the HICSS (2000)
Lindsey, S., Raghavendra, C.: PEGASIS: Power-Efficient gathering in sensor information systems. In: Proceedings of the IEEE Aerospace Conference, vol. 3, pp. 1125–1130 (2002)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM (2004)
Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: Proceedings of the ACM CCS (2002)
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of the ACM WSNA (2003)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Enery Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proceedings of the IEEE PerCom (March 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H., Nyang, D., Song, J. (2006). Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. In: Zhou, X., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4097. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11807964_29
Download citation
DOI: https://doi.org/10.1007/11807964_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36850-2
Online ISBN: 978-3-540-36851-9
eBook Packages: Computer ScienceComputer Science (R0)