Authentication of Queries in Wireless Sensor Networks

AQF protocol is a novel approach to authenticate queries in wireless sensor networks to avoid that anybody can inject fake queries in to WSN and likewise to avoid modification of legitimate queries by adversary. Because in any sensor network, sensor nodes are distributed in a width geographical area, an adversary can get a physical access to some sensor nodes and use them to inject some fake queries or to change some of forwarded quires into the network. AQF will use a probabilistic algorithm for finding and stopping illegitimate queries before they can reach to their destination. Duplicate keys between sensor nodes make it a bit easier for adversary to guess and generate a fake query. Because AQF use a random function to assign encryption keys, there is always a possibility to have duplicate keys during generating a query or checking the legitimacy of forwarded queries.Segment base version of AQF which we proposed use a segmentation method to distributed cryptographic keys between sensor nodes instead of using a random way. With this method, there is no chance to have duplicate keys in sensor network. This version has a better performance for detecting fake queries and it does not need more resources in comparison with basic version.

Contents

1. Introduction
1.1 Problem description
2. Background
3. AQF Protocol
3.1 Definitions
3.2 System Model
3.2.1 Sensor Network Architecture
3.2.2 Adversary Model
3.3 Cryptographic Basics
3.3.1 Pre-distribution of ID-Based Random Keys
3.3.2 1-bit MACs
3.4 Basic Authenticated Query Flooding (bAQF)
3.4.1 Base Station
3.4.2 Sensor Nodes
3.5 Analysis of protocol
3.5.1 Identification Probability of an Illegitimate Query
3.5.2 Propagation Probability of Illegitimate Queries
3.5.3 Choosing Parameters
3.5.4 Analysis of Random Numbers Probability in bAQF Protocol
4. Segment-based AQF
4.1 Definitions
4.2 System Model
4.3 Segment-based Key Assignment
4.4 Segment-based Version
4.4.1 Base Station
4.4.2 Sensor Nodes
4.5 Analysis of Segment-based Version
4.5.1 Identification Probability of a Fake Query
4.5.2 Identification Probability of Fake Queries
4.5.3 Benefits and Limitations of using Segments
5. Evaluation
5.1 Simulation
5.1.1 Comparing results
5.1.2 Simulation Results
5.2 Analytic Evaluation
5.3 Advantages and Disadvantages of Protocols
6. Conclusion
7. References
Appendix A. Index
Appendix B. AQF Simulator
Appendix C. AQF Simulator Configuration File

Author: Monshi Pouri, Shahram

Source: Uppsala University Library

Download URL 2: Visit Now

Leave a Comment