Secure Event Reporting Protocol for Sense-Response Applications

نویسندگان

  • Saurabh Ganeriwal
  • Ramkumar Rengaswamy
  • Chih-Chieh Han
  • Mani B. Srivastava
چکیده

Sense-response applications are widely being used for safeguarding critical infrastructure. In such applications, the sensor nodes detect and report events of interest to the base-station which promptly responds with a physical response. A concern that arises immediately is regarding the ability of the sensor nodes to encounter malicious entities that benefit from any form of damage to the critical infrastructure. Due to the lack of physical security and tamper resistant hardware around the sensor nodes, adversaries can easily compromise them, recover their embedded cryptographic material, and subsequently make them pose as authorized nodes in the network. Such compromised nodes can now launch an attack on the network to either suppress the reporting of genuine events or inject false events to the base-station, thereby rendering the entire system useless. We describe a Secure Event Reporting Protocol (SERP) for sense-response applications which ensures the generation and delivery of valid event reports in the presence of internal attacks launched by compromised nodes within the network. SERP exploits the redundancy and the mutual oversight within a group of nodes triggered by an event to generate an event report which is authenticated by a subset of these nodes. The protocol depends upon the presence of pairwise cryptographic keys between two nodes detecting a common event. We also propose a scalable post deployment mechanism for establishing these keys in the network. Our scheme exploits the Physical Attributes of the sensor nodes for Key Establishment and is referred to as PAKE. We have developed a prototype implementation of SERP and PAKE mechanisms for Mica2 motes and conducted several experiments to evaluate the overall system resiliency to attacks by internally compromised nodes. The obtained results show that SERP generates event report securely and efficiently.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005