Authenticated Queries in Sensor Networks

نویسنده

  • Zinaida Benenson
چکیده

This work-in-progress report investigates the problem of authenticated querying in sensor networks. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query was originated by a legitimate entity. I precisely define authenticated querying, analyze the design space for realizing it and propose solutions to this problem in presence of node capture attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Realizing Robust User Authentication in Sensor Networks

We investigate how to organize access control to the WSN data in such a way that an unauthorized entity (the adversary) cannot make arbitrary queries to the WSN. We call this problem authenticated querying. Roughly, this means that whenever the sensor nodes process a query, they should be able to verify that the query comes from a legitimate user. Authenticated querying is especially challengin...

متن کامل

Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and

Top-k queries have attracted interest in many different areas like network and system monitoring, information retrieval, sensor networks, and so on. Since today many applications issue top-k queries on distributed and outsourced databases, authentication of top-k query results becomes more important. This paper addresses the problem of authenticated top-k aggregation queries (e.g. “find the k o...

متن کامل

بهینه سازی پایداری داده های مفید و قابل اعتماد در شبکه های حسگر بی سیم بی ملازم

In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for...

متن کامل

ARMS: An Authenticated Routing Message in Sensor Networks

In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a se...

متن کامل

Key Establishment Scheme for Sensor Networks with Low Communication Cost

Recently, Huang et al. proposed an efficient authenticated key establishment scheme for self-organizing sensor networks. However, in their scheme, a sensor node and a security manager should exchange public-key certificates to authenticate each other. In this paper, we propose an efficient authenticated key establishment scheme which can reduce the communication cost of transmitting public-key ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005