Security support for in-network processing in Wireless Sensor Networks
- 31 October 2003
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.Keywords
This publication has 20 references indexed in Scilit:
- SIAPublished by Association for Computing Machinery (ACM) ,2003
- Rushing attacks and defense in wireless ad hoc network routing protocolsPublished by Association for Computing Machinery (ACM) ,2003
- MANTISPublished by Association for Computing Machinery (ACM) ,2003
- Collaborative In-Network Processing for Target TrackingEURASIP Journal on Advances in Signal Processing, 2003
- Denial of service in sensor networksComputer, 2002
- A key-management scheme for distributed sensor networksPublished by Association for Computing Machinery (ACM) ,2002
- Wireless sensor networks for habitat monitoringPublished by Association for Computing Machinery (ACM) ,2002
- Directed diffusionPublished by Association for Computing Machinery (ACM) ,2000
- Password authentication with insecure communicationCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978