Title :
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
Author :
Rasheed, Amar ; Mahapatra, Rabi N.
Author_Institution :
Dept. of Comput. Sci. & Eng., Texas A&M Univ., College Station, TX, USA
fDate :
5/1/2012 12:00:00 AM
Abstract :
Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme.
Keywords :
mobile communication; private key cryptography; public key cryptography; telecommunication security; wireless sensor networks; attacker; authentication mechanism; compromised sensor; data accumulation; data collection; key pool; localized sensor reprogramming; mobile sink; mobile sink replication attack; pairwise key establishment; pairwise key predistribution scheme; polynomial pool-based scheme; probabilistic key predistribution scheme; q-composite key predistribution scheme; security challenge; stationary access node replication attack; three-tier security scheme; wireless sensor networks; Authentication; Mobile communication; Mobile computing; Polynomials; Probabilistic logic; Wireless sensor networks; Distributed; security; wireless sensor networks.;
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
DOI :
10.1109/TPDS.2010.185