Message and its origin authentication protocol for data aggregation in sensor networks

Hong Ki Lee, Dae Hun Nyang, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages but also for upstream messages among neighbors, and it solves the secret value update issue with multiple Merkle trees and unbalanced energy consumption among sensor nodes with graceful handover of aggregator. In treating compromised node problem, our protocol provides an equivalent security level of pair-wise key sharing scheme, while much less memory requirements compared to pair-wise key sharing scheme.

Original languageEnglish
Title of host publicationEmerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops
Subtitle of host publicationNCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings
EditorsXiaobo Zhou, Oleg Sokolsky, Lu Yan, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong-Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu
PublisherSpringer Verlag
Pages281-290
Number of pages10
ISBN (Print)3540368507, 9783540368502
DOIs
StatePublished - 2006
EventEUC 2006: Embedded and Ubiquitous Computing Workshops - Seoul, Korea, Republic of
Duration: 1 Aug 20064 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4097 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceEUC 2006: Embedded and Ubiquitous Computing Workshops
Country/TerritoryKorea, Republic of
CitySeoul
Period1/08/064/08/06

Keywords

  • Aggregation
  • Authentication
  • Hash chain
  • Merkle tree
  • Sensor networks

Fingerprint

Dive into the research topics of 'Message and its origin authentication protocol for data aggregation in sensor networks'. Together they form a unique fingerprint.

Cite this