Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks

Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao

Research output: Contribution to conferencePaperpeer-review

64 Scopus citations

Abstract

Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sensors, and other network maintenance. Employing mobile sinks however raises a new security challenge: if a mobile sink is given too many privileges, it will become very attractive for attack and compromise. Using a compromised mobile sink, an adversary may easily bring down or even take over the sensor network. Thus, security mechanisms that can tolerate mobile sink compromises are essential. In this paper, based on the principle of least privilege, we first propose several efficient schemes to restrict the privilege of a mobile sink without impeding its capability of carrying out any authorized operations for an assigned task. To further reduce the possible damages caused by a compromised mobile sink, we then propose efficient message forwarding schemes for depriving the privilege assigned to a compromised mobile sink immediately after its compromise has been detected. Through detailed analysis and simulations, we show that our schemes are secure and efficient, and are highly practical for sensor networks consisting of the current generation of sensors.

Original languageEnglish (US)
Pages378-389
Number of pages12
StatePublished - 2005
EventMOBIHOC 2005: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing - Urbana-Champaign, IL, United States
Duration: May 25 2005May 28 2005

Other

OtherMOBIHOC 2005: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
Country/TerritoryUnited States
CityUrbana-Champaign, IL
Period5/25/055/28/05

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks'. Together they form a unique fingerprint.

Cite this