ABSTRACT
In an end-to-end encryption model for a wireless sensor network (WSN), the network control center preloads encryption and decryption keys to the sensor nodes and the subscribers respectively, such that a subscriber can use a mobile device in the deployment field to decrypt the sensed data encrypted by the more resource-constrained sensor nodes. This paper proposes SMS-SED, a provably secure yet practically efficient key assignment system featuring a discrete time-based access control, to better support a business model where the sensors deployer rents the WSN to customers who desires a higher flexibility beyond subscribing to strictly consecutive periods. In SMS-SED, a node or a mobile device stores a secret key of size independent of the total number of sensor nodes and time periods. We evaluated the feasibility of deploying 2000 nodes for 4096 time periods at 1024-bit of security as a case study, studied the trade off of increasing the storage requirement of a node to significantly reduce its computation time, and provided formal security argument in the random oracle model.
- A. O. L. Atkin and D. J. Bernstein. Prime sieves using binary quadratic forms. Mathematics of Computation, 73(246):1023--1030, 2004.Google ScholarCross Ref
- Y. Bakos and E. Brynjolfsson. Bundling information goods: Pricing, profits, and efficiency. Management Science, 45(12):1613--1630, 1999. Google ScholarDigital Library
- N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - EUROCRYPT'97, volume 1233 of LNCS, pages 480--494, 1997. Google ScholarDigital Library
- M. Bellare, P. Rogaway, and D. Wagner. The EAX mode of operation. In Fast Software Encryption (FSE'04), volume 3017 of LNCS, pages 389--407, 2004.Google Scholar
- J. Benaloh and M. de Mare. Efficient broadcast time-stamping. Technical Report TR-MCS-92-1, Clarkson University Department of Mathematics and Computer Science, April 1992.Google Scholar
- H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy (S&P'03), pages 197--213, 2003. Google ScholarDigital Library
- H.-Y. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10):1301--1304, 2004. Google ScholarDigital Library
- S. S. M. Chow, M. H. Au, and W. Susilo. Server-aided signatures verification secure against collusion attack. In 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'11), 2011. To appear. Google ScholarDigital Library
- S. S. M. Chow, J. K. Liu, and J. Zhou. Identity-based online/offline key encapsulation and encryption. In 6th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'11), 2011. To appear. Google ScholarDigital Library
- R. Cramer and V. Shoup. Signature schemes based on the strong RSA assumption. In 6th ACM Conference on Computer and Communications Security (CCS'99), pages 46--51, 1999. Google ScholarDigital Library
- W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE International Conference on Computer Communications (INFOCOM'04), pages 597--607, 2004.Google Scholar
- W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili. A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2):228--258, May 2005. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In 9th ACM Conference on Computer and Communications Security (CCS'02), pages 41--47, 2002. Google ScholarDigital Library
- W. Hu, P. I. Corke, W. C. Shih, and L. Overs. secFleck: A public key technology platform for wireless sensor networks. In 6th European Conference on Wireless Sensor Networks (EWSN'09), volume 5432 of LNCS, pages 296--311, 2009. Google ScholarDigital Library
- D. Liu and P. Ning. Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(2):204--239, Nov 2005. Google ScholarDigital Library
- D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1):41--77, Feb 2005. Google ScholarDigital Library
- D. Micciancio. The RSA group is pseudo-free. In Advances in Cryptology - EUROCRYPT'05, volume 3494 of LNCS, pages 387--403, 2005. Google ScholarDigital Library
- A. Mohaisen, D. Nyang, and K. Lee. Hierarchical grid-based pairwise key pre-distribution in wireless sensor networks. Intl. Journal of Network Security (IJNSEC), 8(1):282--292, 2009.Google Scholar
- B. Parno, A. Perrig, and V. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy (S&P'05), pages 49--63, 2005. Google ScholarDigital Library
- R. Poovendran, C. Wang, and S. Roy, editors. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security. Springer, 2006. Google ScholarDigital Library
- P. Pritchard. Linear prime-number sieves: A family tree. Science of Computer Programming, 9(1):17--35, 1987. Google ScholarDigital Library
- V. Shoup. Practical threshold signatures. In Advances in Cryptology - EUROCRYPT'00, volume 1807 of LNCS, pages 207--220, 2000. Google ScholarDigital Library
- W.-G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE), 14(1):182--188, 2002. Google ScholarDigital Library
- D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In 11th ACM Conference on Computer and Communications Security (CCS'04), pages 354--363, 2004. Google ScholarDigital Library
- X. Yi. Security of Chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering (TKDE), 17(9):1298--1299, 2005. Google ScholarDigital Library
- X. Yi and Y. Ye. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE), 15(4):1054--1055, 2003. Google ScholarDigital Library
- W. T. Zhu, R. H. Deng, J. Zhou, and F. Bao. Time-bound hierarchical key assignment: An overview. IEICE Transactions on Information and Systems, E93-D(5):1044--1052, 2010.Google Scholar
Index Terms
- Secure mobile subscription of sensor-encrypted data
Recommendations
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher
NCM '09: Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDCSecurity is one of the major issue for the Ubiquitous Sensor Networks’ (USNs) applications. The evolution of Ubiquitous sensor networks provides a unique solution for many ubiquitous information services. Apparently, it challenges the data security and ...
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have been widely applied to sensing data from different environments. Owing to the resource limitations of WSNs, the data may be tampered easily during transmission. It may happen that data reach incorrect destinations or ...
A secure ubiquitous sensor network with Dragon
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information TechnologyThe creation of wireless sensor networks provides a capable solution for a range of ubiquitous information services. Its challenges like, data security and secrecy due to its hostile deployment nature of being flat to physical attacks with restricted ...
Comments