ABSTRACT
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigated. In this paper, we explore the task of providing data and entity authentication for hierarchical ad hoc sensor networks. Our sensor network consists of three tiers of devices with varying levels of computational and communication capabilities. Our lowest tier consists of compute-constrained sensors that are unable to perform public key cryptography. To address this resource constraint, we present a new type of certificate, called a TESLA certificate, that can be used by low-powered nodes to perform entity authentication. Our framework authenticates incoming nodes, maintains trust relationships during topology changes through an efficient handoff scheme, and provides data origin authentication for sensor data. Further, our framework assigns authentication tasks to nodes according to their computational resources, with resource-abundant access points performing digital signatures and maintaining most of the security parameters. We conclude by providing an initial performance evaluation and security analysis for our framework.
- A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521--534, 2002.]] Google ScholarDigital Library
- A. Weimerskirch and G. Thonet, "A distributed light-weight authentication model for ad-hoc networks," in The 4th International Conference on Information Security and Cryptology (ICISC 2001), pp. 341-354, 2001.]] Google ScholarDigital Library
- L. Venkatraman and D. Agrawal, "A novel authentication scheme for ad hoc networks," in IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, pp. 1268--1273, 2000.]]Google Scholar
- J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multi-layer ad-hoc networks," Special Issue of Wireless Communications and Mobile Computing, 2002.]]Google Scholar
- J. Kong, and M. Gerla, "Providing Real-time Security Support for Multi-level Ad-hoc Networks," MILCOM, vol. 2, pp. 1350--1355, 2002.]]Google Scholar
- P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Transactions on Information Theory IT 2000, vol. IT-46(2), pp. 388--404, 2000.]]Google Scholar
- P. Gupta and P. Kumar, "Internets in the sky: the capacity of three dimensional wireless networks," Communications in Information Systems, vol. 1(1), pp. 33--50, 2001.]]Google ScholarCross Ref
- S. Zhao, K. Tepe, I. Seskar, and D. Raychaudhuri, "Routing protocols for self-organizing hierarchical ad-hoc wireless networks," in IEEE Sarnoff 2003 Symposium.]]Google Scholar
- D. Johnson, D. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multihop wireless ad hoc networks," in Ad Hoc Networking, edited by Charles E. Perkins. 2001, pp. 139--172, Addison-Wesley.]] Google ScholarDigital Library
- P. R. Zimmermann, The official PGP user's guide, MIT Press, 1995.]] Google ScholarDigital Library
- ITU-T, "The directory: authentication framework," IT - Open Systems Interconnection.]]Google Scholar
- A. Perrig, R. Canetti, B. Brisco, D. Song, and D. Tygar, "TESLA: Multicast source authentication transform introduction," IETF working draft, draft-ietf-msec-tesla-intro-01.txt.]]Google Scholar
- M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," Advances in Cryptology - Crypto '96, pp. 1--15.]] Google ScholarDigital Library
- L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24--30, 1999.]]Google ScholarDigital Library
- "Libtomcrypt," www.libtomcrypt.org.]]Google Scholar
- "Intrinsyc product page," www.intrinsyc.com/products/cerfcube.]]Google Scholar
Index Terms
- An authentication framework for hierarchical ad hoc sensor networks
Recommendations
Authentication protocols for ad hoc networks: taxonomy and research issues
Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networksAd hoc networks, such as sensor and mobile ad hoc networks, must overcome a myriad of security challenges to realize their potential in both civil and military applications. Typically, ad hoc networks are deployed in un-trusted environments. ...
A New Certificateless and Secure Authentication Scheme for Ad hoc Networks
Most of the authentication protocols which have been proposed so far are vulnerable to security attacks, and none of them provides non-repudiation property. Therefore, this paper aims to present a novel certificateless and secure mutual authentication ...
Identity-based deniable authentication for ad hoc networks
Deniable authentication is an important security requirement for ad hoc networks. However, all known identity-based deniable authentication (IBDA) protocols are lack of formal security proof which is very important for cryptographic protocol design. In ...
Comments