Abstract | ||
---|---|---|
If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We first determine security issues in the context of access control in sensor networks especially focusing on the problem of node capture, i.e., the possibility that an attacker can completely take over some of the sensor nodes. We then introduce the notion of t-robust sensor networks which can withstand capture of up to t nodes and consider three basic security concepts for such networks: (1) t-robust storage, a mechanism to securely store data within a set of sensors such that capture of any t sensors does not reveal that data to the adversary; (2) n-authentication which ensures that authentication is achieved with every uncompromised sensor in the broadcast range of a client (n denotes the number of nodes in that broadcast range); and (3) n-authorization, an authorization primitive with similar properties like n-authentication. We present a generic t-robust protocol for implementing access control using these primitives. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/EWSN.2005.1462007 | PROCEEDINGS OF THE SECOND EUROPEAN WORKSHOP ON WIRELESS SENSOR NETWORKS |
Keywords | Field | DocType |
message authentication,authorisation,wireless sensor network,data dissemination,wireless sensor networks,sensor network,data collection,access control,precision agriculture,robust control | Key distribution in wireless sensor networks,Authentication,Message authentication code,Computer science,Computer network,Access control,Mobile wireless sensor network,Robust control,Wireless sensor network,Broadcast range | Conference |
Citations | PageRank | References |
6 | 0.73 | 14 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zinaida Benenson | 1 | 235 | 24.76 |
Felex C. Gartner | 2 | 6 | 0.73 |
Dogan Kesdogan | 3 | 355 | 42.53 |