Access control in wireless sensor networks

Yun Zhou, Yanchao Zhang, Yuguang Fang

Research output: Contribution to journalArticle

89 Citations (Scopus)

Abstract

Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious "new" nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.

Original languageEnglish (US)
Pages (from-to)3-13
Number of pages11
JournalAd Hoc Networks
Volume5
Issue number1
DOIs
StatePublished - Jan 2007
Externally publishedYes

Fingerprint

Access control
Sensor networks
Wireless sensor networks
Network protocols
Authentication
Cryptography
Network security
Joining
Communication

Keywords

  • Access control
  • Diffie-Hellman
  • ECC
  • RSA
  • Sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Access control in wireless sensor networks. / Zhou, Yun; Zhang, Yanchao; Fang, Yuguang.

In: Ad Hoc Networks, Vol. 5, No. 1, 01.2007, p. 3-13.

Research output: Contribution to journalArticle

Zhou, Yun ; Zhang, Yanchao ; Fang, Yuguang. / Access control in wireless sensor networks. In: Ad Hoc Networks. 2007 ; Vol. 5, No. 1. pp. 3-13.
@article{af7134243ed94c2eaad655bf1754437f,
title = "Access control in wireless sensor networks",
abstract = "Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious {"}new{"} nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.",
keywords = "Access control, Diffie-Hellman, ECC, RSA, Sensor networks",
author = "Yun Zhou and Yanchao Zhang and Yuguang Fang",
year = "2007",
month = "1",
doi = "10.1016/j.adhoc.2006.05.014",
language = "English (US)",
volume = "5",
pages = "3--13",
journal = "Ad Hoc Networks",
issn = "1570-8705",
publisher = "Elsevier",
number = "1",

}

TY - JOUR

T1 - Access control in wireless sensor networks

AU - Zhou, Yun

AU - Zhang, Yanchao

AU - Fang, Yuguang

PY - 2007/1

Y1 - 2007/1

N2 - Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious "new" nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.

AB - Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military scenarios, adversaries may directly deploy malicious nodes or manipulate existing nodes to introduce malicious "new" nodes through many kinds of attacks. To prevent malicious nodes from joining the sensor network, access control is required in the design of sensor network protocols. In this paper, we propose an access control protocol based on Elliptic Curve Cryptography (ECC) for sensor networks. Our access control protocol accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods based on the node identity, our access control protocol includes both the node identity and the node bootstrapping time into the authentication procedure. Hence our access control protocol cannot only identify the identity of each node but also differentiate between old nodes and new nodes. In addition, each new node can establish shared keys with its neighbors during the node authentication procedure. Compared with conventional sensor network security solutions, our access control protocol can defend against most well-recognized attacks in sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC than those based on RSA.

KW - Access control

KW - Diffie-Hellman

KW - ECC

KW - RSA

KW - Sensor networks

UR - http://www.scopus.com/inward/record.url?scp=33750012404&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33750012404&partnerID=8YFLogxK

U2 - 10.1016/j.adhoc.2006.05.014

DO - 10.1016/j.adhoc.2006.05.014

M3 - Article

AN - SCOPUS:33750012404

VL - 5

SP - 3

EP - 13

JO - Ad Hoc Networks

JF - Ad Hoc Networks

SN - 1570-8705

IS - 1

ER -