Computer Science ›› 2013, Vol. 40 ›› Issue (Z11): 4-7.

Previous Articles     Next Articles

Security in Wireless Sensor Networks with Mobile Sink

ZHANG Xu-bin and LIU Zhi-hong   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Unattended wireless sensor networks operating in hostile environments face the risk of compromise.Given the unattended nature,sensors must safeguard their sensed data of high value temporarily.However,saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network.In some occasions,a network controller may periodically dispatch mobile sinks to collect data.If a mobile sink is given too many privileges,it will become very attractive for attack.Thus,the privilege of mobile sinks should be restricted.Additionally,secret keys should be used to achieve data confidentiality,integrity,and authentication between communicating parties.To address these security issues,we present mAKPS,an asymmetric key predistribution scheme with mobile sinks,to facilitate the key distribution and privilege restriction of mobile sinks.

Key words: Key predistribution,Mobile sink,Security,Wireless sensor network

[1] Chen Xiang-qian,Makki K,Yen Kang,et al.Sensor network security:a survey [J].IEEE Communications Surveys & Tuto-rials,Second Quarter 2009,11(2):52-73
[2] Ma Di,Tsudik G.Extended abstract:Forward-secure sequential aggregate authentication[C]∥IEEE Symposium on Security and Privacy,2007.Berkeley,CA:IEEE,2007:86-91
[3] Di Pietro R,Mancini L V,Soriente C,et al.Catch me (if you can):Data survival in unattended sensor networks[C]∥Sixth Annual IEEE International Conference on Pervasive Computing and Communications,PerCom’ 08,2008.Hong Kong:IEEE,2008:185-194
[4] Ma Di,Tsudik G.Dish:Distributed self-healing (in unattended sensor networks)[C]∥ SSS 2008,LNCS 5340,2008.Berlin Heidelberg:Springer-Verlag,2008:47-62
[5] Rasheed A,Mahapatra R N.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J].IEEE Transa-ctions on Parallel and Distributed Systems,2012,23(5):958-965
[6] Zhang Wen-sheng,Song Hui,Zhu Sen-cun,et al.Least privilege and privilege deprivation:towards tolerating mobile sink compromises in wireless sensor networks[C]∥Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’ 05),2005.New York,NY,USA:ACM,2005:378-389
[7] Liu Zhi-hong,Ma Jian-feng,Huang Qi-ping,et al.Asymmetrickey pre-distribution scheme for sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1366-1372
[8] Leighton T,Micali S.Secret-key agreement without public-key cryptography[C]∥Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO’ 93),1993.London,UK:Springer-Verlag,1993:456-479

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!