Securing sensor networks with location-based keys

Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Citations (Scopus)

Abstract

Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. This paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme, which is not only able to localize the impact of compromised nodes within their vicinity, but also to facilitate the establishment of pairwise keys between neighboring nodes. Compared with previous proposals, our scheme has perfect resilience against node compromise, low storage overhead, and good network scalability. We also demonstrate the use of location-based keys in combating a few notorious attacks against sensor network routing protocols.

Original languageEnglish (US)
Title of host publicationIEEE Wireless Communications and Networking Conference, WCNC
Pages1909-1914
Number of pages6
Volume4
DOIs
StatePublished - 2005
Externally publishedYes
Event2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off - New Orleans, LA, United States
Duration: Mar 13 2005Mar 17 2005

Other

Other2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off
CountryUnited States
CityNew Orleans, LA
Period3/13/053/17/05

Fingerprint

Sensor networks
Network routing
Routing protocols
Authentication
Scalability
Wireless sensor networks
Sensors

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2005). Securing sensor networks with location-based keys. In IEEE Wireless Communications and Networking Conference, WCNC (Vol. 4, pp. 1909-1914). [NET30-1] https://doi.org/10.1109/WCNC.2005.1424811

Securing sensor networks with location-based keys. / Zhang, Yanchao; Liu, Wei; Lou, Wenjing; Fang, Yuguang.

IEEE Wireless Communications and Networking Conference, WCNC. Vol. 4 2005. p. 1909-1914 NET30-1.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhang, Y, Liu, W, Lou, W & Fang, Y 2005, Securing sensor networks with location-based keys. in IEEE Wireless Communications and Networking Conference, WCNC. vol. 4, NET30-1, pp. 1909-1914, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off, New Orleans, LA, United States, 3/13/05. https://doi.org/10.1109/WCNC.2005.1424811
Zhang Y, Liu W, Lou W, Fang Y. Securing sensor networks with location-based keys. In IEEE Wireless Communications and Networking Conference, WCNC. Vol. 4. 2005. p. 1909-1914. NET30-1 https://doi.org/10.1109/WCNC.2005.1424811
Zhang, Yanchao ; Liu, Wei ; Lou, Wenjing ; Fang, Yuguang. / Securing sensor networks with location-based keys. IEEE Wireless Communications and Networking Conference, WCNC. Vol. 4 2005. pp. 1909-1914
@inproceedings{c7a5c3b71b424e7fb7c3327f8b6f7237,
title = "Securing sensor networks with location-based keys",
abstract = "Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. This paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme, which is not only able to localize the impact of compromised nodes within their vicinity, but also to facilitate the establishment of pairwise keys between neighboring nodes. Compared with previous proposals, our scheme has perfect resilience against node compromise, low storage overhead, and good network scalability. We also demonstrate the use of location-based keys in combating a few notorious attacks against sensor network routing protocols.",
author = "Yanchao Zhang and Wei Liu and Wenjing Lou and Yuguang Fang",
year = "2005",
doi = "10.1109/WCNC.2005.1424811",
language = "English (US)",
isbn = "0780389662",
volume = "4",
pages = "1909--1914",
booktitle = "IEEE Wireless Communications and Networking Conference, WCNC",

}

TY - GEN

T1 - Securing sensor networks with location-based keys

AU - Zhang, Yanchao

AU - Liu, Wei

AU - Lou, Wenjing

AU - Fang, Yuguang

PY - 2005

Y1 - 2005

N2 - Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. This paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme, which is not only able to localize the impact of compromised nodes within their vicinity, but also to facilitate the establishment of pairwise keys between neighboring nodes. Compared with previous proposals, our scheme has perfect resilience against node compromise, low storage overhead, and good network scalability. We also demonstrate the use of location-based keys in combating a few notorious attacks against sensor network routing protocols.

AB - Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. This paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme, which is not only able to localize the impact of compromised nodes within their vicinity, but also to facilitate the establishment of pairwise keys between neighboring nodes. Compared with previous proposals, our scheme has perfect resilience against node compromise, low storage overhead, and good network scalability. We also demonstrate the use of location-based keys in combating a few notorious attacks against sensor network routing protocols.

UR - http://www.scopus.com/inward/record.url?scp=24944483778&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944483778&partnerID=8YFLogxK

U2 - 10.1109/WCNC.2005.1424811

DO - 10.1109/WCNC.2005.1424811

M3 - Conference contribution

AN - SCOPUS:24944483778

SN - 0780389662

VL - 4

SP - 1909

EP - 1914

BT - IEEE Wireless Communications and Networking Conference, WCNC

ER -