lec-13 - Sensor Networks HopHopby-Hop Authentication...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Sensor Networks Sensor Networks –Hop Hop- by by-Hop Authentication Hop Authentication Shambhu Upadhyaya Wireless Network Security Shambhu Upadhyaya 1 CSE 566 (Lecture 13) Introduction • Sensor networks are subject to false data injection attacks - Deployed in unattended environments - Goal may be to deceive base station or deplete resources on relaying nodes • Interleaved hop-by-hop authentication Shambhu Upadhyaya 2 scheme guarantees detection of injected false data packets - If no more than t nodes are compromised
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Application Scenario Military application of sensor networks for reconnaissance of the opposing forces Deploy a cluster of sensor nodes around each area of interest - Tank movements, ship arrivals, munition plant - Deploy a base station in a secure location to control the sensors and collect data An adversary may compromise several sensor nodes - Inject false data into the network - Traditional authentication not good since adversary knows Shambhu Upadhyaya 3 all the keying material possessed by the compromised nodes Goal of research - address false data injection attack - Base station verifies the authenticity of report - Filter out false data packets injected by compromised nodes Proposed Solution • Hop-by-hop authentication scheme in which at least t+1 nodes have to agree upon a report before sending it to the base station • All nodes in the path from the source to the base station participate in authenticating the report in an interleaved fashion • Guarantees detection subject to a security Shambhu Upadhyaya 4 threshold - No more than t nodes are compromised
Background image of page 2
3 Assumptions Sensor nodes are organized in clusters (at least t+1 nodes) Cluster head role may be rotated Network links are bidirectional Every node shares a master key with BS Each node establishes a pairwise key with its one-hop
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 8

lec-13 - Sensor Networks HopHopby-Hop Authentication...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online