Abstract
Once a wireless sensor network (WSN) is stable and has been running for a while, sensors start to fail due to hardware problems, battery exhaustion or even due to their physical destruction. In any case, the administrator of the network may wish to replace the damaged nodes with new ones to reinforce the coverage area. In this paper we make use of an out of band channel (OOB) to bootstrap an authenticated symmetric key. The protocol ensures that the new sensor nodes are currently part of the region covered by the network before negotiating sensitive key material and making them a part of the system and its operations. We describe a novel approach to group admission for wireless sensor networks using an OOB secure channel and perform a security evaluation over this protocol.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pietro, R.D., Mancini, L., Mei, A.: Random key-assignment for secure wireless sensor networks. In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), pp. 62–71 (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Networks 8, 521–534 (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (2003)
Zhu, S., Setia, S., Jajodia, S.: Leap: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 62–72. ACM Press, New York (2003)
Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks (2002)
Hoepman, J.: The ephemeral pairing problem. In: 8th Int. Conf. Finantial Cryptography, Key West, FL, USA (2004)
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: SP 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 110–124. IEEE Computer Society, Washington (2005)
Wong, F.L., Stajano, F.: Multi-channel protocols. In: Proceedings of Security Protocols Workshop. LNCS, Springer, Heidelberg (2005)
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. Cryptobytes 7, 29–37 (2004)
Holmquist, L., Friedemann, M., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.: Smart-its friends: A technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, p. 116. Springer, Heidelberg (2001)
Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review, ACM SIGCOMM 26, 5–26 (1996)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
Research, C.: Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Version 1.0 (2000)
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication using manually authenticated strings. Research Report in the IACR ePrint archive (2005), http://eprint.iacr.org/2005/424
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Cryptographic Hardware and Embedded Systems (CHES), 119–132 (2004)
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: Umac: Fast and secure message authentication. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216–233. Springer, Heidelberg (1999)
Hill, J., Levis, P., Madden, S., Woo, A., Polastre, J., Whitehouse, C., Szewczyk, R., Sharp, C., Gay, D., Welsh, M., Culler, D., Brewer, E.: TinyOS (2005), http://www.tinyos.net
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Girao, J., Martin, M. (2006). Two’s Company, Three Is a Crowd: A Group-Admission Protocol for WSNs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_8
Download citation
DOI: https://doi.org/10.1007/11964254_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69172-3
Online ISBN: 978-3-540-69173-0
eBook Packages: Computer ScienceComputer Science (R0)