skip to main content
10.1145/941311.941324acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

An authentication framework for hierarchical ad hoc sensor networks

Authors Info & Claims
Published:19 September 2003Publication History

ABSTRACT

Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigated. In this paper, we explore the task of providing data and entity authentication for hierarchical ad hoc sensor networks. Our sensor network consists of three tiers of devices with varying levels of computational and communication capabilities. Our lowest tier consists of compute-constrained sensors that are unable to perform public key cryptography. To address this resource constraint, we present a new type of certificate, called a TESLA certificate, that can be used by low-powered nodes to perform entity authentication. Our framework authenticates incoming nodes, maintains trust relationships during topology changes through an efficient handoff scheme, and provides data origin authentication for sensor data. Further, our framework assigns authentication tasks to nodes according to their computational resources, with resource-abundant access points performing digital signatures and maintaining most of the security parameters. We conclude by providing an initial performance evaluation and security analysis for our framework.

References

  1. A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521--534, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Weimerskirch and G. Thonet, "A distributed light-weight authentication model for ad-hoc networks," in The 4th International Conference on Information Security and Cryptology (ICISC 2001), pp. 341-354, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Venkatraman and D. Agrawal, "A novel authentication scheme for ad hoc networks," in IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, pp. 1268--1273, 2000.]]Google ScholarGoogle Scholar
  4. J. Kong, H. Luo, K. Xu, D. Gu, M. Gerla, and S. Lu, "Adaptive security for multi-layer ad-hoc networks," Special Issue of Wireless Communications and Mobile Computing, 2002.]]Google ScholarGoogle Scholar
  5. J. Kong, and M. Gerla, "Providing Real-time Security Support for Multi-level Ad-hoc Networks," MILCOM, vol. 2, pp. 1350--1355, 2002.]]Google ScholarGoogle Scholar
  6. P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Transactions on Information Theory IT 2000, vol. IT-46(2), pp. 388--404, 2000.]]Google ScholarGoogle Scholar
  7. P. Gupta and P. Kumar, "Internets in the sky: the capacity of three dimensional wireless networks," Communications in Information Systems, vol. 1(1), pp. 33--50, 2001.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. S. Zhao, K. Tepe, I. Seskar, and D. Raychaudhuri, "Routing protocols for self-organizing hierarchical ad-hoc wireless networks," in IEEE Sarnoff 2003 Symposium.]]Google ScholarGoogle Scholar
  9. D. Johnson, D. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multihop wireless ad hoc networks," in Ad Hoc Networking, edited by Charles E. Perkins. 2001, pp. 139--172, Addison-Wesley.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. R. Zimmermann, The official PGP user's guide, MIT Press, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ITU-T, "The directory: authentication framework," IT - Open Systems Interconnection.]]Google ScholarGoogle Scholar
  12. A. Perrig, R. Canetti, B. Brisco, D. Song, and D. Tygar, "TESLA: Multicast source authentication transform introduction," IETF working draft, draft-ietf-msec-tesla-intro-01.txt.]]Google ScholarGoogle Scholar
  13. M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," Advances in Cryptology - Crypto '96, pp. 1--15.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24--30, 1999.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. "Libtomcrypt," www.libtomcrypt.org.]]Google ScholarGoogle Scholar
  16. "Intrinsyc product page," www.intrinsyc.com/products/cerfcube.]]Google ScholarGoogle Scholar

Index Terms

  1. An authentication framework for hierarchical ad hoc sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security
          September 2003
          106 pages
          ISBN:1581137699
          DOI:10.1145/941311

          Copyright © 2003 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 September 2003

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          WiSe '03 Paper Acceptance Rate10of41submissions,24%Overall Acceptance Rate10of41submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader