Title :
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
Author :
Chang, Katharine ; Shin, Kang G.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI
fDate :
Aug. 28 2006-Sept. 1 2006
Abstract :
Security in wireless sensor networks has become important as sensor networks are being used for an increasing number of applications. The severe resource constraints in each sensor make it very challenging to secure sensor networks. Moreover, sensors are usually deployed in hostile and unattended environments, and hence, are susceptible to various attacks, including node capture, physical tampering, and manipulation of the sensor program. The authors of T. Park and K.G. Shin, (2005) proposed a soft tamper-proofing scheme that verifies the integrity of the program in each sensor device, called the program integrity verification (PIV). This paper addresses how to authenticate PIV servers (PIVSes) in a fully-distributed manner. Our distributed authentication protocol of PIVSes (DAPP) uses the Blundo scheme (C. Blundo et al., 1992) and allows sensors to authenticate PIVSes without requiring commonly-used trusted third parties, such as authentication servers (ASes), in the network. We implement and evaluate both the DAPP and the PIV on Mica2 Motes and laptops. We also analyze the security of DAPP under different attack models, demonstrating its capability to deal with various types of attacks
Keywords :
protocols; telecommunication security; wireless sensor networks; Blundo scheme; Mica2 Motes; distributed authentication; distributed authentication protocol; node capture; physical tampering; program integrity verification; sensor program manipulation; severe resource constraints; soft tamper-proofing scheme; wireless sensor networks security; Authentication; Capacitive sensors; Communication system security; Computer security; Cryptography; Intrusion detection; Military computing; Network servers; Protocols; Wireless sensor networks;
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0423-1
Electronic_ISBN :
1-4244-0423-1
DOI :
10.1109/SECCOMW.2006.359561