DOC PREVIEW
MASON ECE 646 - Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

AD-2 1 Abstract—Wireless sensor networks is a widely adapted technology applied to various civilian, commercial and military domains. Due to the broad application of WSNs, security is a necessary requirement. Nodes of a WSN need to protect the information they collect and authenticate the nodes/base-stations they exchange information with. Nodes cannot assume trust with other nodes and base stations, because this would introduce a security loop hole in the network k, where malicious nodes can launch man-in-the middle attacks or inject forged packets into the network. Due to the resource-constrained nature of the nodes, we need to be careful about the security mechanisms we deploy. In this paper, we will explore the various security issues associated with WSN, but focus on a mechanism for authentication; more specifically, authenticating the base-station to nodes. We will then explore Zero Knowledge Proofs and how they can be applied to in our authenticate scheme. Index Terms—authentication, wireless, zero-knowledge, sensors I. INTRODUCTION IRELESS sensor networks (WSN) are wireless networks with spatially distributed nodes that monitor the conditions of its environment and base-stations to which they report the data. Nodes are low cost devices which are limited in resources and power. They are autonomous (no human intervention required for operation), and can be deployed for long periods with very little to no maintenance. Nodes are normally deployed in hostile environments, which make them prone to physical attacks, harsh weather, and communication interference. The information they collect is reported back to a base-station for processing. Depending on the size of the network, nodes can utilize different approaches to sending messages across the network. In a small network, a single hop approach could be used to send messages (a mesh network). In a large network, where proximity is not available, a multi-hop approach would be used along with some routing Manuscript received December 6, 2007 S. Keith, is with the Volgeneu School of Information Technology and Engineering, George Mason University, Fairfax, VA 22030 USA. S. Lin, is with the Volgeneu School of Information Technology and Engineering, George Mason University, Fairfax, VA 22030 USA (e-mail: [email protected]). algorithm to get messages to its intended destination. In this paper, we will assume that routing has been accounted for and messages will reach its intended recipient with non-zero probability. WSNs have a broad range of applications, including (but not limited to): • Environmental observation - Used to monitor the environment's changes; such as temperature throughout a city, conditions of water in a lake, air quality to monitor pollution. • Military monitoring - Used for military battlefield surveillance, such as motion sensors to detect intruders, vehicle traffic. • Building monitoring - Temperature and other climate monitoring. Sensors for motion, to ensure the structural integrity of the building. • Health care - Monitor a patients’ health by having sensors implanted in different parts of the patients body. WSNs carry various advantages when compared to a wired setup. Sensor nodes are relatively inexpensive, and easy to maintain and deploy. They operate on battery and are self contained; they do not require much maintenance to operate and are very versatile in extreme conditions, resulting in fast deployment. Since they're wireless, they can be moved, and the topology of the network can change without much additional work. Nodes are also limited in their capabilities. Nodes serve one purpose, to collecting data about its environment and reporting it for processing. Due to its resource constraints, it is limited in any responsibilities additional to its primary data gathering role. The base-station is a special node that processes information received from nodes and connects the sensor network to other networks. In an internet of sensor networks, base-stations would normally be connected via high bandwidth communication channels. Base-stations have enhanced capabilities compared to the sensor nodes they manage, along with additional resources. Base stations have workstation or laptop grade processors and have the capability to perform complex processing on data, and manage cryptographic keys. Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks Cryptography and Network Security Final Project Report Stephen Keith, Sammy Lin WAD-2 2 The base station is normally more physically secure due to the processing power it has and the information it processes; they are not subjected to the same harsh conditions as the nodes. The base station also has more power to work with, they are not constrained to just batteries; base stations would normally utilized uninterruptible power supplies, so that it can remain operable during power outages. II. SECURITY ISSUES Sensor nodes are normally deployed in hostile environments, where the risk of physical attacks is high. Attackers can tamper with the nodes or introduce malicious nodes into the network. Since sensor networks utilize wireless technology for communication, networks are also susceptible to eavesdropping, and packet tampering. Due to the open, distributed, compromise-prone and resource-lacking nature of WSNs, various security issues are present. The following is a list of security requirements in WSNs (but not limited to): • Confidentiality - The information being passed between nodes needs to be kept confidential. Certain applications require this, such as military use of nodes on the battlefield. When used in medical applications, patient information is required to be kept confidential, even during transport. • Authentication - Nodes in the network need to authenticate themselves to the network. Unauthenticated nodes can cause serious damage to a sensor networks (e.g., Byzantine attacks). Nodes also need to authenticate the base-station is


View Full Document

MASON ECE 646 - Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks

Documents in this Course
Load more
Download Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Zero-Knowledge Proofs as Authentication Method in Wireless Sensor Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?