skip to main content
10.1145/1066677.1066754acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

A ZKP-based identification scheme for base nodes in wireless sensor networks

Published: 13 March 2005 Publication History

Abstract

Most of the published work on authentication mechanisms for wireless sensor networks establishes secure authentication for sensor nodes, but not for the base node that is in fact required to authenticate other nodes in the same network. This situation can lead to an attack whereby a malicious party masquerades as the base station and fraudulently authenticates other legitimate nodes to capture and/or inject messages within the network. The trust assumption in the existing literature with regard to base stations (i.e., implicitly trusting the base station) presents a serious security loophole. We address this problem by proposing a protocol that will help build a base station authentication mechanism in the framework of a one-hop mesh network and later extend it to a multi-hop framework. Our network would consist of a commissioning/installation device, and several forests of nodes (a base node and other nodes). The installation device would be responsible for deploying nodes in an area selected and would distribute information to them as necessary. We shall use a modification of the Guillou-Quisquater identification scheme as our Zero-Knowledge (ZK) protocol in conjunction with the μTESLA protocol for authenticated broadcast, to authenticate the base station.

References

[1]
D. Bertsekas and R. Gallager. Data Networks. Prentice Hall of India, 2nd edition, 2002.
[2]
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, 2003. Preliminary version in 17th STOC, 1985.
[3]
L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In C. G. Guenther, editor, Advances in Cryptology - EUROCRYPT'88, volume 330 of LNCS, pages 123--128. Springer, 1988.
[4]
L. Hu and D. Evans. Secure aggregation for wireless networks. In IEEE Symposium on Applications and the Internet Workshops, January 2003.
[5]
Q. Huang, J. Cukier, B. L. H. Kobayashi, and J. Zhang. Fast authenticated key establishment protocols for zigbee wireless sensor networks. Technical Report TR-20030-102, MERL - A Mitsubishi Electric Research Laboratory, August 2003.
[6]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, fifth reprint edition, August 2001.
[7]
T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. In Advances in Cryptology - CRYPTO 92, volume 740 of LNCS, pages 31--53. Springer, 1992.
[8]
A. Perrig, V. W. Robert Szewczyk, J. D. Tygar, and D. E. Culler. Spins: Security protocols for sensor networks. Wireless Networks, 8:521--534, 2002.
[9]
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6), 1999.

Cited By

View all
  • (2012)A Practical Privacy-preserving Password Authentication Scheme for Cloud ComputingProceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum10.1109/IPDPSW.2012.148(1210-1217)Online publication date: 21-May-2012
  • (2011)Using zero knowledge to share a little knowledgeProceedings of the 13th international conference on Stabilization, safety, and security of distributed systems10.5555/2050613.2050641(371-385)Online publication date: 10-Oct-2011
  • (2011)Using Zero Knowledge to Share a Little Knowledge: Bootstrapping Trust in Device NetworksStabilization, Safety, and Security of Distributed Systems10.1007/978-3-642-24550-3_28(371-385)Online publication date: 2011
  • Show More Cited By

Index Terms

  1. A ZKP-based identification scheme for base nodes in wireless sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
    March 2005
    1814 pages
    ISBN:1581139640
    DOI:10.1145/1066677
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 March 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. base stations
    2. entity authentication
    3. guillou-quisquater protocol
    4. security protocols
    5. sensor and ad hoc networks
    6. wireless security
    7. zero-knowledge protocol

    Qualifiers

    • Article

    Conference

    SAC05
    Sponsor:
    SAC05: The 2005 ACM Symposium on Applied Computing
    March 13 - 17, 2005
    New Mexico, Santa Fe

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2012)A Practical Privacy-preserving Password Authentication Scheme for Cloud ComputingProceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum10.1109/IPDPSW.2012.148(1210-1217)Online publication date: 21-May-2012
    • (2011)Using zero knowledge to share a little knowledgeProceedings of the 13th international conference on Stabilization, safety, and security of distributed systems10.5555/2050613.2050641(371-385)Online publication date: 10-Oct-2011
    • (2011)Using Zero Knowledge to Share a Little Knowledge: Bootstrapping Trust in Device NetworksStabilization, Safety, and Security of Distributed Systems10.1007/978-3-642-24550-3_28(371-385)Online publication date: 2011
    • (2011)Authentication in Wireless Sensor Networks Using Zero Knowledge ProtocolComputer Networks and Intelligent Computing10.1007/978-3-642-22786-8_52(416-421)Online publication date: 2011
    • (2010)Authentication Using Virtual Certificate AuthoritiesProceedings of the 2010 Ninth IEEE International Symposium on Network Computing and Applications10.1109/NCA.2010.19(92-99)Online publication date: 15-Jul-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media