Abstract

Wireless sensor networks and other power-efficient devices fill increasingly important roles in modern society. At the same time, they also face increasing internal and external threats, such as node capture or protocol disruption by adversarial agents. Providing reliable and secure service in the face of these challenges remains an ongoing problem, and one that is only exacerbated by the computational and power constraints imposed on these devices. In this paper, we first introduce the concept of on-demand topic channels in the context of ephemeral wireless sensor networks. Then, building on this concept, we introduce three novel messaging protocols to provide secure, authenticated communication between a sensor network and an authorized user while also providing resilience from accidental or adversarial disruption. These protocols leverage homomorphic hashing in innovative ways to trade secrecy against network and computational costs in on-demand topic channel authentication. Finally, we compare and contrast the costs of these protocols, and show that hash-based protocols provide significant implementation-independent improvements to network resilience.

Original languageEnglish (US)
Title of host publicationProceedings - 2018 IEEE 37th Symposium on Reliable Distributed Systems, SRDS 2018
PublisherIEEE Computer Society
Pages83-92
Number of pages10
ISBN (Electronic)9781538683019
DOIs
StatePublished - Jan 15 2019
Event37th Symposium on Reliable Distributed Systems, SRDS 2018 - Salvador, Brazil
Duration: Oct 2 2018Oct 5 2018

Publication series

NameProceedings of the IEEE Symposium on Reliable Distributed Systems
Volume2019-October
ISSN (Print)1060-9857

Conference

Conference37th Symposium on Reliable Distributed Systems, SRDS 2018
CountryBrazil
CitySalvador
Period10/2/1810/5/18

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Adversarially-resistant on-demand topic channels for wireless sensor networks'. Together they form a unique fingerprint.

Cite this