skip to main content
10.1145/1134680.1134683acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks

Authors Info & Claims
Published:19 June 2006Publication History

ABSTRACT

The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are unable to leverage key distribution centers (KDCs) to assist them with key management. In networks with a heterogeneous mix of nodes, however, it is not unrealistic to assume that some more powerful nodes have at least intermittent contact with a backbone network. For instance, an air-deployed battlefield network may have to operate securely for some time until uplinked friendly forces move through the area. We therefore propose LIGER, a hybrid key management scheme for heterogeneous sensor networks that allows systems to operate in both the presence and absence of a KDC. Specifically, when no KDC is available, nodes communicate securely with each other based upon a probabilistic unbalanced method of key management. The ability to access a KDC allows nodes to probabilistically authenticate neighboring devices with which they are communicating. We also demonstrate that this scheme is robust to the compromise of both low and high capability nodes and that the same keys can be used for both modes of operation. Detailed experiments and simulations are used to show that LIGER is a highly practical solution for the current generation of sensors and the unbalanced approach can significantly reduce network initialization time.

References

  1. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, August 2002.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Crossbow. Wireless sensor networks. http://www.xbow.com/Products/Wireless Sensor Networks.htm.]]Google ScholarGoogle Scholar
  4. W. Du, J. Deng, S. Han, and P.K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings from the Conference of the IEEE Communications Society (Infocom), 2004.]]Google ScholarGoogle Scholar
  5. L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Fox and S. Gribble. Security on the move: indirect authentication using kerberos. In Proceedings of the Conference on Mobile Computing and Networking (MobiCom), 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In Proceedings of the ACM Conference of Embedded Networked Sensor System (SenSys), 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Kohl and B. Neuman. The Kerberos Network Authentication Service (V5), 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Liu and P. Ning. Location-based pairwise key establishments in static sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Madden, M. Franklin, J. Hellerstein, and W. Hong. TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems, 30(1):122--173, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Conference on Mobile Computing and Networking (MobiCom), 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shroff. A minimum cost heterogeneous sensor network with a lifetime constraint. IEEE Transactions on Mobile Computing, January 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commuinications of the ACM, 21:993--999, 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Perrig, R. Canetti, D. Tygar, and D. Song. The tesla broadcast authentication protocol. RSA CryptoBytes, 5(2):2--13, 2002.]]Google ScholarGoogle Scholar
  16. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. Spins: Security protocols for sensor networks. ACM Wireless Networking, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28, 1949.]]Google ScholarGoogle Scholar
  18. TinyOS. http://www.tinyos.net, 2005.]]Google ScholarGoogle Scholar
  19. Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta. Establishing pair-wise keys in heterogeneous sensor networks. In Proceedings of IEEE INFOCOM, 2006.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. H. Yang, X. Meng, and S. Lu. Self-organized network layer security in mobile ad hoc networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. In Proceedings from the Conference of the IEEE Communications Society (Infocom), 2005.]]Google ScholarGoogle Scholar
  22. S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the IEEE International Conference on Network Protocols, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '06: Proceedings of the 4th international conference on Mobile systems, applications and services
      June 2006
      268 pages
      ISBN:1595931953
      DOI:10.1145/1134680

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 June 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader