Authenticated Queries in Sensor Networks
نویسنده
چکیده
This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node capture attacks.
منابع مشابه
Realizing Robust User Authentication in Sensor Networks
We investigate how to organize access control to the WSN data in such a way that an unauthorized entity (the adversary) cannot make arbitrary queries to the WSN. We call this problem authenticated querying. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query comes from a legitimate user. Authenticated querying is especially challengin...
متن کاملAuthenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and
Top-k queries have attracted interest in many different areas like network and system monitoring, information retrieval, sensor networks, and so on. Since today many applications issue top-k queries on distributed and outsourced databases, authentication of top-k query results becomes more important. This paper addresses the problem of authenticated top-k aggregation queries (e.g. “find the k o...
متن کاملبهینه سازی پایداری داده های مفید و قابل اعتماد در شبکه های حسگر بی سیم بی ملازم
In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for...
متن کاملARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a se...
متن کاملKey Establishment Scheme for Sensor Networks with Low Communication Cost
Recently, Huang et al. proposed an efficient authenticated key establishment scheme for self-organizing sensor networks. However, in their scheme, a sensor node and a security manager should exchange public-key certificates to authenticate each other. In this paper, we propose an efficient authenticated key establishment scheme which can reduce the communication cost of transmitting public-key ...
متن کامل