Abstract
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats the overhead when getting in touch with this new paradigm. This does first and foremost mean that, once the WSN is deployed, it is easy to collect data also for a technical unexperienced audience. However, the trust in the system’s confidentiality and its reliability should not be underestimated. Since for end-users from various disciplines the monitored data are of highest value they will only apply WSN technology to their professional activities if a proper and safe access control mechanism to the WSN is ensured. For FIPS 140-02 level 2 or level 3 conform sensor devices we provide an access control protocol for end-users of civilian WSN applications that i) ensures access to the monitored data only for authorised parties, ii) supports user-friendly data queries and iii) is DoS resilient to save the sensor nodes’ battery capacity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. In: ACM Operating Ssystems Review (1998)
Benenson, Z.: Authenticated Queries in Sensor Networks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 54–67. Springer, Heidelberg (2005)
Benenson, Z., Pimenidis, L., Freiling, F.C., Lucks, S.: Authenticated Query Flooding in Sensor Networks. In: 4th IEEE Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, pp. 644–647 (2006)
FIPS PUB 140-2, Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication, National Institute of Standards and Technology
Heinzelmann, W.: Application-Specific Protocol Architectures for Wireless Networks, PhD thesis, MIT (2000)
Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks. Elsevier Ad Hoc Journal (to appear as regular paper)
Hellerstein, J.M., Hong, W., Madden, S., Stanek, K.: Beyond Average: Towards Sophisticated Sensing with Queries. In: Workshop on IPSN 2003, Palo Alto, CA, USA (April 2003)
Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, Chichester (2005)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Madden, S., Franklin, M.J., Hellerstein, J., Hong, W.: TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: 5th Symposium on OSDI (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5 (Summer, 2002)
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)
Tilak, S., Abu-Ghazaleh, N.B., Heinzelmann, W.: Collaborative Storage Management in Sensor Networks. Journal of Ad Hoc & Ubi. Comp.
Weimerskirch, A., Westhoff, D.: Zero-Common Knowldge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)
Westhoff, D., Girao, J., Acharya, M.: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks: Encryption, Key Pre-distribution and Routing. IEEE Transactions on Mobile Comuting 10 (October 2006)
Westhoff, D.: End-user friendly and DoS Resilient Access Control for WSNs. In: 13th International Conference on Telecommunication, ICT, Portugal (May 2006)
Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks. In: IEEE International Conference on Communications (ICC 2005), Seoul, Korea (May 2005)
Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TinyDB: an acquisitional query processing system for sensor networks. ACM Trans. Database Syst. 30(1) (2005)
Zhou, L., Ravishankar, C.V.: Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. In: IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey (June 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Armknecht, F., Girao, J., Stoecklin, M., Westhoff, D. (2006). Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_4
Download citation
DOI: https://doi.org/10.1007/11964254_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69172-3
Online ISBN: 978-3-540-69173-0
eBook Packages: Computer ScienceComputer Science (R0)