Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

ARMS: An Authenticated Routing Message in Sensor Networks

  • Conference paper
Secure Mobile Ad-hoc Networks and Sensors (MADNES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4074))

Included in the following conference series:

Abstract

In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a sensor node’s broadcast message should be authenticated by all its neighbors. Unfortunately, the previous work on broadcast authentication in sensor networks mainly concentrates on broadcast messages from a base station which has greater capabilities, not from a sensor node. Those schemes’ properties are not appropriate for broadcast authentication of sensor node’s routing messages. In this paper, we present ARMS, a protocol for broadcast authentication of sensor node’s routing messages. It requires only a small memory space, authenticates routing messages without delay (thus, no buffering is needed), needs no time synchronization among sensor nodes, and mitigates the effect of packet loss. These ARMS’ properties are suitable for a sensor node to broadcast an authenticated routing message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (May 2003)

    Google Scholar 

  2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security (CCS) (November 2002)

    Google Scholar 

  3. Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, Department of Computer Science University of Colorado at Boulder (January 2005)

    Google Scholar 

  4. Heinzelman, W.R., Kulik, J., Balakrishnan, H.: Adaptive protocols for information dissemination in wireless sensor networks. In: Proceedings of the ACM MobiCom 1999, Seattle, Washington, pp. 174–185 (1999)

    Google Scholar 

  5. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: First IEEE InternationalWorkshop on Sensor Network Protocols and Applications (May 2003)

    Google Scholar 

  6. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)

    Google Scholar 

  7. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security (CCS) (October 2003)

    Google Scholar 

  8. Liu, D., Ning, P.: Multi-Level μ-TESLA: A Broadcast Authentication System for Distributed Sensor Networks (submitted for journal publication); Also available as Technical Report, TR-2003-08, North Carolina State University, Department of Computer Science (March 2003)

    Google Scholar 

  9. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (May 2000)

    Google Scholar 

  10. Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (February 2001)

    Google Scholar 

  11. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004) (Special Issue on Wireless sensor networks)

    Article  Google Scholar 

  12. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001) (2001)

    Google Scholar 

  13. Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, SB., Choi, YH. (2006). ARMS: An Authenticated Routing Message in Sensor Networks. In: Burmester, M., Yasinsac, A. (eds) Secure Mobile Ad-hoc Networks and Sensors. MADNES 2005. Lecture Notes in Computer Science, vol 4074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11801412_15

Download citation

  • DOI: https://doi.org/10.1007/11801412_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36646-1

  • Online ISBN: 978-3-540-37863-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics