[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

  • Conference paper
Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4357))

Included in the following conference series:

Abstract

The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats the overhead when getting in touch with this new paradigm. This does first and foremost mean that, once the WSN is deployed, it is easy to collect data also for a technical unexperienced audience. However, the trust in the system’s confidentiality and its reliability should not be underestimated. Since for end-users from various disciplines the monitored data are of highest value they will only apply WSN technology to their professional activities if a proper and safe access control mechanism to the WSN is ensured. For FIPS 140-02 level 2 or level 3 conform sensor devices we provide an access control protocol for end-users of civilian WSN applications that i) ensures access to the monitored data only for authorised parties, ii) supports user-friendly data queries and iii) is DoS resilient to save the sensor nodes’ battery capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. In: ACM Operating Ssystems Review (1998)

    Google Scholar 

  2. Benenson, Z.: Authenticated Queries in Sensor Networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 54–67. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Benenson, Z., Pimenidis, L., Freiling, F.C., Lucks, S.: Authenticated Query Flooding in Sensor Networks. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, pp. 644–647 (2006)

    Google Scholar 

  4. FIPS PUB 140-2, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication, National Institute of Standards and Technology

    Google Scholar 

  5. Heinzelmann, W.: Application-Specific Protocol Architectures for Wireless Networks, PhD thesis, MIT (2000)

    Google Scholar 

  6. Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks. Elsevier Ad Hoc Journal (to appear as regular paper)

    Google Scholar 

  7. Hellerstein, J.M., Hong, W., Madden, S., Stanek, K.: Beyond Average: Towards Sophisticated Sensing with Queries. In: Workshop on IPSN 2003, Palo Alto, CA, USA (April 2003)

    Google Scholar 

  8. Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, Chichester (2005)

    Book  Google Scholar 

  9. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  10. Madden, S., Franklin, M.J., Hellerstein, J., Hong, W.: TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: 5th Symposium on OSDI (2002)

    Google Scholar 

  11. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5 (Summer, 2002)

    Google Scholar 

  12. Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  13. Tilak, S., Abu-Ghazaleh, N.B., Heinzelmann, W.: Collaborative Storage Management in Sensor Networks. Journal of Ad Hoc & Ubi. Comp.

    Google Scholar 

  14. Weimerskirch, A., Westhoff, D.: Zero-Common Knowldge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Westhoff, D., Girao, J., Acharya, M.: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing. IEEE Transactions on Mobile Comuting 10 (October 2006)

    Google Scholar 

  16. Westhoff, D.: End-user friendly and DoS Resilient Access Control for WSNs. In: 13th International Conference on Telecommunication, ICT, Portugal (May 2006)

    Google Scholar 

  17. Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks. In: IEEE International Conference on Communications (ICC 2005), Seoul, Korea (May 2005)

    Google Scholar 

  18. Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Trans. Database Syst. 30(1) (2005)

    Google Scholar 

  19. Zhou, L., Ravishankar, C.V.: Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. In: IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey (June 2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Armknecht, F., Girao, J., Stoecklin, M., Westhoff, D. (2006). Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_4

Download citation

  • DOI: https://doi.org/10.1007/11964254_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69172-3

  • Online ISBN: 978-3-540-69173-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics