Skip to main content

Exploring Message Authentication in Sensor Networks

  • Conference paper
Security in Ad-hoc and Sensor Networks (ESAS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3313))

Included in the following conference series:

Abstract

This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and physical and virtual multipath authentication. While end-to-end authentication provides the highest and most general security level, it may be too costly or impractical to implement. On the other end of the security scale, hop-to-hop authentication can be implemented with little effort but provides security only to a highly restricted attacker. Multipath authentication provides an intermediate security level that may be appropriate for many applications of sensor networks, trading energy for security guarantees. Virtual multipaths offer an improvement, reducing energy demands while retaining crucial security properties of physical multipaths.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure Pebblenets. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 156–163. ACM Press, New York (2001)

    Chapter  Google Scholar 

  2. Beimel, A., Franklin, M.: Reliable Communication over Partially Authenticated Networks. Theoretical Computer Science 220(1), 185–210 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  3. Braginsky, D., Estrin, D.: Rumor Routing Algorthim for Sensor Networks. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 22–31. ACM Press, New York (2002)

    Chapter  Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE, Los Alamitos (2003)

    Google Scholar 

  5. Dürr, F., Rothermel, K.: On a Location Model for Fine-Grained Geocast. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 18–35. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: CCS 2002. ACM, New York (2002)

    Google Scholar 

  7. Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks. Mobile Computing and Communications Review 1(2) (1997)

    Google Scholar 

  8. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks. Elsevier Ad Hoc Networks 1(2-3), 295–315 (2003)

    Article  Google Scholar 

  9. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(8), 521–534 (2002)

    Article  MATH  Google Scholar 

  10. Reiter, M.K., Stubblebine, S.G.: Resilient Authentication Using Path Independence. IEEE Transactions on Computers 47(12), 1351–1362 (1998)

    Article  MathSciNet  Google Scholar 

  11. Römer, K.: The Lighthouse Location System for Smart Dust. In: Proceedings of MobiSys 2003 (ACM/USENIX Conference on Mobile Systems, Applications, and Services), San Francisco, CA, USA, May 2003, pp. 15–30 (2003)

    Google Scholar 

  12. Römer, K.: Tracking Real-World Phenomena with Smart Dust. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 28–43. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a Sensor Network Expedition. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 307–322. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Vogt, H.: Integrity Preservation for Communication in Sensor Networks. Technical Report 434, ETH Zürich, Institute for Pervasive Computing (February 2004)

    Google Scholar 

  15. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Technical Report ISE-TR-03-01, George Mason University (March 2003)

    Google Scholar 

  16. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pp. 62–72. ACM Press, New York (2003)

    Chapter  Google Scholar 

  17. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks. In: IEEE Symposium on Security and Privacy. IEEE, Los Alamitos (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vogt, H. (2005). Exploring Message Authentication in Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30496-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24396-0

  • Online ISBN: 978-3-540-30496-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics