One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks
- 524 Downloads
Dealing with captured nodes is generally accepted as the most difficult challenge to wireless sensor network security. By utilizing the low-cost property of sensor nodes, we introduce the novel concept of one-time sensors to mitigate node-capture attacks. The basic idea is to load each sensor with only one cryptographic token so that the captured node can inject only a single malicious message into the network. In addition, sybil attacks are avoided and explicit revocation is not necessary using one-time sensors. By using public key techniques, one-way hash functions and Merkle’s hash tree, we also show efficient implementations and interesting tradeoffs for one-time sensors.
KeywordsSensor network security one-time sensor node-capture attack sybil attack Merkle’s hash tree
Unable to display preview. Download preview PDF.
- 2.CONSESSUS Project, http://www.aramis-research.ch/d/7082.html
- 5.Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science, University of Colorado (January 2005)Google Scholar
- 8.Merkle, R.C.: A Digital Signature Based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
- 9.Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proc. 2nd ACM Conference on Embedded Networked Sensor Systems, SenSys 2004, November 2004, pp. 162–175 (2004)Google Scholar
- 13.Chan, H., Perrig, A., Song, D.X.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society, Los Alamitos (2003)Google Scholar