One-Time Sensors: A Novel Concept to Mitigate Node Capture Attacks,

K. Bicakci, C.D. Gamage, B. Crispo, A.S. Tanenbaum

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Dealing with captured nodes is generally accepted as the most difficult challenge to wireless sensor network security. By utilizing the low-cost property of sensor nodes, we introduce the novel concept of one-time sensors to mitigate node-capture attacks. The basic idea is to load each sensor with only one cryptographic token so that the captured node can inject only a single malicious message into the network. In addition, sybil attacks are avoided and explicit revocation is not necessary using one-time sensors. By using public key techniques, one-way hash functions and Merkle's hash tree, we also show efficient implementations and interesting tradeoffs for one-time sensors. © Springer-Verlag Berlin Heidelberg 2005.
Original languageEnglish
Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers
PublisherSpringer
Pages80-90
Number of pages11
Volume3813 LNCS
ISBN (Print)3540309128, 9783540309123
DOIs
Publication statusPublished - 2005
EventSecond European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005 - Visegrad, Hungary
Duration: 13 Jul 200514 Jul 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3813 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

WorkshopSecond European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005
CountryHungary
CityVisegrad
Period13/07/0514/07/05

Keywords

  • Merkle's hash tree
  • Node-capture attack
  • One-time sensor
  • Sensor network security
  • Sybil attack

Fingerprint

Dive into the research topics of 'One-Time Sensors: A Novel Concept to Mitigate Node Capture Attacks,'. Together they form a unique fingerprint.

Cite this