Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

  • Frederik Armknecht
  • Joao Girao
  • Marc Stoecklin
  • Dirk Westhoff
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4357)


The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats the overhead when getting in touch with this new paradigm. This does first and foremost mean that, once the WSN is deployed, it is easy to collect data also for a technical unexperienced audience. However, the trust in the system’s confidentiality and its reliability should not be underestimated. Since for end-users from various disciplines the monitored data are of highest value they will only apply WSN technology to their professional activities if a proper and safe access control mechanism to the WSN is ensured. For FIPS 140-02 level 2 or level 3 conform sensor devices we provide an access control protocol for end-users of civilian WSN applications that i) ensures access to the monitored data only for authorised parties, ii) supports user-friendly data queries and iii) is DoS resilient to save the sensor nodes’ battery capacity.


Sensor Network Sensor Node Wireless Sensor Network Access Control Hash Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. In: ACM Operating Ssystems Review (1998)Google Scholar
  2. 2.
    Benenson, Z.: Authenticated Queries in Sensor Networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 54–67. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Benenson, Z., Pimenidis, L., Freiling, F.C., Lucks, S.: Authenticated Query Flooding in Sensor Networks. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, pp. 644–647 (2006)Google Scholar
  4. 4.
    FIPS PUB 140-2, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication, National Institute of Standards and TechnologyGoogle Scholar
  5. 5.
    Heinzelmann, W.: Application-Specific Protocol Architectures for Wireless Networks, PhD thesis, MIT (2000)Google Scholar
  6. 6.
    Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks. Elsevier Ad Hoc Journal (to appear as regular paper)Google Scholar
  7. 7.
    Hellerstein, J.M., Hong, W., Madden, S., Stanek, K.: Beyond Average: Towards Sophisticated Sensing with Queries. In: Workshop on IPSN 2003, Palo Alto, CA, USA (April 2003)Google Scholar
  8. 8.
    Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, Chichester (2005)CrossRefGoogle Scholar
  9. 9.
    Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)CrossRefMathSciNetGoogle Scholar
  10. 10.
    Madden, S., Franklin, M.J., Hellerstein, J., Hong, W.: TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: 5th Symposium on OSDI (2002)Google Scholar
  11. 11.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5 (Summer, 2002)Google Scholar
  12. 12.
    Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Tilak, S., Abu-Ghazaleh, N.B., Heinzelmann, W.: Collaborative Storage Management in Sensor Networks. Journal of Ad Hoc & Ubi. Comp.Google Scholar
  14. 14.
    Weimerskirch, A., Westhoff, D.: Zero-Common Knowldge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  15. 15.
    Westhoff, D., Girao, J., Acharya, M.: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing. IEEE Transactions on Mobile Comuting 10 (October 2006)Google Scholar
  16. 16.
    Westhoff, D.: End-user friendly and DoS Resilient Access Control for WSNs. In: 13th International Conference on Telecommunication, ICT, Portugal (May 2006)Google Scholar
  17. 17.
    Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks. In: IEEE International Conference on Communications (ICC 2005), Seoul, Korea (May 2005)Google Scholar
  18. 18.
    Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Trans. Database Syst. 30(1) (2005)Google Scholar
  19. 19.
    Zhou, L., Ravishankar, C.V.: Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. In: IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey (June 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Frederik Armknecht
    • 1
  • Joao Girao
    • 1
  • Marc Stoecklin
    • 2
  • Dirk Westhoff
    • 1
  1. 1.NEC Europe Ltd. 
  2. 2.Swiss Federal Institute of TechnologyLausanne

Personalised recommendations