Research Article
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
@INPROCEEDINGS{10.1109/SECCOMW.2006.359561, author={Katharine Chang and Kang G. Shin}, title={Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks}, proceedings={2nd International ICST Conference on Security and Privacy in Comunication Networks}, publisher={IEEE}, proceedings_a={SECURECOMM}, year={2007}, month={5}, keywords={}, doi={10.1109/SECCOMW.2006.359561} }
- Katharine Chang
Kang G. Shin
Year: 2007
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
SECURECOMM
IEEE
DOI: 10.1109/SECCOMW.2006.359561
Abstract
Security in wireless sensor networks has become important as sensor networks are being used for an increasing number of applications. The severe resource constraints in each sensor make it very challenging to secure sensor networks. Moreover, sensors are usually deployed in hostile and unattended environments, and hence, are susceptible to various attacks, including node capture, physical tampering, and manipulation of the sensor program. The authors of T. Park and K.G. Shin, (2005) proposed a soft tamper-proofing scheme that verifies the integrity of the program in each sensor device, called the program integrity verification (PIV). This paper addresses how to authenticate PIV servers (PIVSes) in a fully-distributed manner. Our distributed authentication protocol of PIVSes (DAPP) uses the Blundo scheme (C. Blundo et al., 1992) and allows sensors to authenticate PIVSes without requiring commonly-used trusted third parties, such as authentication servers (ASes), in the network. We implement and evaluate both the DAPP and the PIV on Mica2 Motes and laptops. We also analyze the security of DAPP under different attack models, demonstrating its capability to deal with various types of attacks