Abstract
This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and physical and virtual multipath authentication. While end-to-end authentication provides the highest and most general security level, it may be too costly or impractical to implement. On the other end of the security scale, hop-to-hop authentication can be implemented with little effort but provides security only to a highly restricted attacker. Multipath authentication provides an intermediate security level that may be appropriate for many applications of sensor networks, trading energy for security guarantees. Virtual multipaths offer an improvement, reducing energy demands while retaining crucial security properties of physical multipaths.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure Pebblenets. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156–163. ACM Press, New York (2001)
Beimel, A., Franklin, M.: Reliable Communication over Partially Authenticated Networks. Theoretical Computer Science 220(1), 185–210 (1999)
Braginsky, D., Estrin, D.: Rumor Routing Algorthim for Sensor Networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 22–31. ACM Press, New York (2002)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE, Los Alamitos (2003)
Dürr, F., Rothermel, K.: On a Location Model for Fine-Grained Geocast. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 18–35. Springer, Heidelberg (2003)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: CCS 2002. ACM, New York (2002)
Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. Mobile Computing and Communications Review 1(2) (1997)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks. Elsevier Ad Hoc Networks 1(2-3), 295–315 (2003)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(8), 521–534 (2002)
Reiter, M.K., Stubblebine, S.G.: Resilient Authentication Using Path Independence. IEEE Transactions on Computers 47(12), 1351–1362 (1998)
Römer, K.: The Lighthouse Location System for Smart Dust. In: Proceedings of MobiSys 2003 (ACM/USENIX Conference on Mobile Systems, Applications, and Services), San Francisco, CA, USA, May 2003, pp. 15–30 (2003)
Römer, K.: Tracking Real-World Phenomena with Smart Dust. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 28–43. Springer, Heidelberg (2004)
Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a Sensor Network Expedition. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 307–322. Springer, Heidelberg (2004)
Vogt, H.: Integrity Preservation for Communication in Sensor Networks. Technical Report 434, ETH Zürich, Institute for Pervasive Computing (February 2004)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Technical Report ISE-TR-03-01, George Mason University (March 2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 62–72. ACM Press, New York (2003)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks. In: IEEE Symposium on Security and Privacy. IEEE, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vogt, H. (2005). Exploring Message Authentication in Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)