8
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE Abstract—Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme. Index Terms—Distributed, security, wireless sensor networks. Ç 1 INTRODUCTION R ECENT advances in electronic technology have paved the way for the development of a new generation of wireless sensor networks (WSNs) consisting of a large number of low-power, low-cost sensor nodes that commu- nicate wirelessly [1]. Such sensor networks can be used in a wide range of applications, such as, military sensing and tracking, health monitoring [2], data acquisition in hazar- dous environments, and habitat monitoring [1]. The sensed data often need to be sent back to the base station for analysis. However, when the sensing field is too far from the base station, transmitting the data over long distances using multihop may weaken the security strength (e.g., some intermediate may modify the data passing by, capturing sensor nodes, launching a wormhole attack [3], a sybil attack [4], selective forwarding [5], [6], sinkhole [7]), and increasing the energy consumption at nodes near the base station, reducing the lifetime of the network. Therefore, mobile sinks (MSs) (or mobile soldiers, mobile sensor nodes) are essential components in the operation of many sensor network applications, including data collection in hazardous envir- onments [8], [9], [10], localized reprogramming, oceano- graphic data collection, and military navigation [11]. In many of these applications, sensor nodes transmit critical information over the network; therefore, security services, such as, authentication and pairwise key estab- lishment between sensor nodes and mobile sinks, are important. However, the resource constraints of the sensors and their nature of communication over a wireless medium make data confidentiality and integrity a non- trivial task. Traditional schemes in ad hoc networks using asymmetric keys are expensive due of their storage and computation cost. These limitations make key predistribu- tion schemes [12], [13], [14], [15], [16], [17], [18] the tools of choice to provide low cost, secure communication between sensor nodes and mobile sinks. However, the problem of authentication and pairwise key establishment in sensor networks with MSs is still not solved in the face of mobile sink replication attacks. For the basic probabilistic [12] and q-composite [13] key predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node. To address the above-mentioned problem, we have developed a general framework [19] that permits the use of any pairwise key predistribution scheme as its basic component, to provide authentication and pairwise key establishment between sensor nodes and MSs. To facilitate the study of a new security technique, we first cultivated a general three-tier security framework for authentication and pairwise key establishment, based on the polynomial pool-based key predistribution scheme [14]. The proposed technique will substantially improve network resilience to mobile sink replication attacks compared to the single polynomial pool-based key predistribution approach [14], as an attacker would have to compromise many more sensor nodes to launch a successful mobile sink replication attack. In the new security framework [19], a small fraction of the preselected sensor nodes (see Fig. 1), called the 958 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012 . The authors are with the Department of Computer Science and Engineering, Texas A&M University, College Station, TX 77845. E-mail: [email protected], [email protected]. Manuscript received 7 Dec. 2009; revised 14 July 2010; accepted 21 Aug. 2010; published online 20 Oct. 2010. Recommended for acceptance by Y.-C. Tseng. For information on obtaining reprints of this article, please send e-mail to: [email protected], and reference IEEECS Log Number TPDS-2009-12-0606. Digital Object Identifier no. 10.1109/TPDS.2010.185. 1045-9219/12/$31.00 ß 2012 IEEE Published by the IEEE Computer Society http://ieeexploreprojects.blogspot.com

The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

Embed Size (px)

Citation preview

Page 1: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

The Three-Tier Security Scheme in WirelessSensor Networks with Mobile Sinks

Amar Rasheed, Student Member, IEEE, and Rabi N. Mahapatra, Senior Member, IEEE

Abstract—Mobile sinks (MSs) are vital in many wireless sensor network (WSN) applications for efficient data accumulation, localized

sensor reprogramming, and for distinguishing and revoking compromised sensors. However, in sensor networks that make use of the

existing key predistribution schemes for pairwise key establishment and authentication between sensor nodes and mobile sinks, the

employment of mobile sinks for data collection elevates a new security challenge: in the basic probabilistic and q-composite key

predistribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can

gain control of the network by deploying a replicated mobile sink preloaded with some compromised keys. This article describes a

three-tier general framework that permits the use of any pairwise key predistribution scheme as its basic component. The new

framework requires two separate key pools, one for the mobile sink to access the network, and one for pairwise key establishment

between the sensors. To further reduce the damages caused by stationary access node replication attacks, we have strengthened the

authentication mechanism between the sensor and the stationary access node in the proposed framework. Through detailed analysis,

we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial

pool-based scheme.

Index Terms—Distributed, security, wireless sensor networks.

Ç

1 INTRODUCTION

RECENT advances in electronic technology have paved theway for the development of a new generation of

wireless sensor networks (WSNs) consisting of a largenumber of low-power, low-cost sensor nodes that commu-nicate wirelessly [1]. Such sensor networks can be used in awide range of applications, such as, military sensing andtracking, health monitoring [2], data acquisition in hazar-dous environments, and habitat monitoring [1]. The senseddata often need to be sent back to the base station foranalysis. However, when the sensing field is too far from thebase station, transmitting the data over long distances usingmultihop may weaken the security strength (e.g., someintermediate may modify the data passing by, capturingsensor nodes, launching a wormhole attack [3], a sybil attack[4], selective forwarding [5], [6], sinkhole [7]), and increasingthe energy consumption at nodes near the base station,reducing the lifetime of the network. Therefore, mobile sinks(MSs) (or mobile soldiers, mobile sensor nodes) are essentialcomponents in the operation of many sensor networkapplications, including data collection in hazardous envir-onments [8], [9], [10], localized reprogramming, oceano-graphic data collection, and military navigation [11].

In many of these applications, sensor nodes transmitcritical information over the network; therefore, securityservices, such as, authentication and pairwise key estab-lishment between sensor nodes and mobile sinks, are

important. However, the resource constraints of thesensors and their nature of communication over a wirelessmedium make data confidentiality and integrity a non-trivial task. Traditional schemes in ad hoc networks usingasymmetric keys are expensive due of their storage andcomputation cost. These limitations make key predistribu-tion schemes [12], [13], [14], [15], [16], [17], [18] the tools ofchoice to provide low cost, secure communication betweensensor nodes and mobile sinks.

However, the problem of authentication and pairwise keyestablishment in sensor networks with MSs is still not solvedin the face of mobile sink replication attacks. For the basicprobabilistic [12] and q-composite [13] key predistributionschemes, an attacker can easily obtain a large number of keysby capturing a small fraction of the network sensor nodes,making it possible for the attacker to take control of theentire network by deploying a replicated mobile sink,preloaded with some compromised keys to authenticateand then initiate data communication with any sensor node.

To address the above-mentioned problem, we havedeveloped a general framework [19] that permits the useof any pairwise key predistribution scheme as its basiccomponent, to provide authentication and pairwise keyestablishment between sensor nodes and MSs. To facilitatethe study of a new security technique, we first cultivated ageneral three-tier security framework for authenticationand pairwise key establishment, based on the polynomialpool-based key predistribution scheme [14]. The proposedtechnique will substantially improve network resilience tomobile sink replication attacks compared to the singlepolynomial pool-based key predistribution approach [14],as an attacker would have to compromise many moresensor nodes to launch a successful mobile sink replicationattack. In the new security framework [19], a small fractionof the preselected sensor nodes (see Fig. 1), called the

958 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012

. The authors are with the Department of Computer Science andEngineering, Texas A&M University, College Station, TX 77845.E-mail: [email protected], [email protected].

Manuscript received 7 Dec. 2009; revised 14 July 2010; accepted 21 Aug.2010; published online 20 Oct. 2010.Recommended for acceptance by Y.-C. Tseng.For information on obtaining reprints of this article, please send e-mail to:[email protected], and reference IEEECS Log Number TPDS-2009-12-0606.Digital Object Identifier no. 10.1109/TPDS.2010.185.

1045-9219/12/$31.00 � 2012 IEEE Published by the IEEE Computer Society

http://ieeexploreprojects.blogspot.com

Page 2: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

stationary access nodes, act as authentication access points tothe network, to trigger the sensor nodes to transmit theiraggregated data to mobile sinks. A mobile sink sends datarequest messages to the sensor nodes via a stationary accessnode. These data request messages from the mobile sink willinitiate the stationary access node to trigger sensor nodes,which transmit their data to the requested mobile sink. Thescheme uses two separate polynomial pools: the mobilepolynomial pool and the static polynomial pool.

Using two separate key pools and having few sensornodes that carry keys from the mobile key pool will make itmore difficult for the attacker to launch a mobile sinkreplication attack on the sensor network by capturing only afew arbitrary sensor nodes. Rather, the attacker would alsohave to capture sensor nodes that carry keys from themobile key pool. Keys from the mobile key pool are usedmainly for mobile sink authentication, and thus, to gainaccess to the network for data gathering.

Although the above security approach makes the net-work more resilient to mobile sink replication attackscompared to the single polynomial pool-based key predis-tribution scheme [14], it is still vulnerable to stationary accessnode replication attacks. In these types of attacks, the attackeris able to launch a replication attack similar to the mobile sinkreplication attack. After a fraction of sensor nodes have beencompromised by an adversary, captured static polynomialscan be loaded into a replicated stationary access node thattransmits the recorded mobile sink’s data request messagesto trigger sensor nodes to send their aggregated data.

To make the three-tier security scheme more robustagainst a stationary access node replication attack, we havestrengthened the authentication mechanism between thestationary access nodes and sensor nodes using one-way hashchains algorithm [20] in conjunction with the static poly-nomial pool-based scheme [14]. Our analytical resultsindicate that the new security technique makes the networkmore resilient to both mobile sink replication attacks andstationary access nodes replication attacks compared to thesingle polynomial pool-based approach.

This paper is organized as follows. Section 2 discussessome existing schemes relevant to those proposed in thispaper. Section 3 presents the security and threat analysis fora mobile sink replication attack, using the proposed scheme[19]. Section 4 shows the security analysis and the threatanalysis for stationary access nodes replication attack, andSection 5 draws conclusions.

2 RELATED WORK

The key management problem is an active research area inwireless sensor networks. Eschenauer and Gilgor [12]proposed a probabilistic key predistribution scheme to

bootstrap the initial trust between the sensor nodes. Themain idea was to let each sensor node randomly pick a setof keys from a key pool before deployment, so that anytwo sensor nodes had a certain probability of sharing atleast one common key. Chan et al. [13] further extendedthis idea and developed two key predistribution schemes:the q-composite key predistribution scheme and therandom pairwise keys scheme. The q-composite keypredistribution scheme also used a key pool, but requiredtwo sensor nodes to compute a pairwise key from at least qpredistributed keys that they shared. The random pairwisekeys scheme randomly picked pairs of sensor nodes andassigned each pair a unique random key. Both schemesimproved the security over the basic probabilistic keypredistribution scheme.

The pairwise key establishment problem, however, is stillnot solved. For the basic probabilistic [12] and the q-composite [13] key predistribution schemes, as the numberof compromised nodes increases, the fraction of affectedpairwise keys also increases quickly. As a result, a smallnumber of compromised nodes may affect a large fraction ofpairwise keys. Although, the random pairwise key does notsuffer from the above-mentioned problem, given a memoryconstraint, the network size is strictly limited by the desiredprobability that two sensor nodes share a pairwise key, asalso by the number of neighbor nodes with which a sensorcan communicate. An enhanced scheme using the t-degreebivariate key polynomial was proposed by Liu et al. [14].They developed a general framework for pairwise keyestablishment using the polynomial-based key predistribu-tion protocol [21] and the probabilistic key distribution in[12] and [13]. Their scheme could tolerate no more than tcompromised nodes, where the value of t was limited by thememory available in the sensor nodes.

3 THE THREE-TIER SECURITY SCHEME

In this study, we have chosen the Blundo scheme [21] toconstruct our approach. As we shall see, the Blundo schemeprovides a clear security guarantee. Use of the Blundoscheme, therefore, greatly eases the presentation of ourstudy and enables us to provide a clearer security analysis.

In the proposed scheme, we use two separate polynomialpools: the mobile polynomial pool and the static polynomialpool. Polynomials from the mobile polynomial pool areused to establish the authentication between mobile sinksand stationary access nodes, which will enable these mobilesinks to access the sensor network for data gathering. Thus,an attacker would need to compromise at least a singlepolynomial from the mobile pool to gain access to thenetwork for the sensor’s data gathering. Polynomials fromthe static polynomial pool are used to ascertain theauthentication and keys setup between the sensor nodesand stationary access nodes.

Prior to deployment, each mobile sink randomly picks asubset of polynomials from the mobile polynomial pool. Inour scheme, to improve the network resilience to mobile sinkreplication attack as compared to the single polynomial pool-based approach, we intend to minimize the probability of amobile polynomial being compromised if Rc sensor nodesare captured. As an adversary can use the captured mobilepolynomial to launch a mobile sink replication attack, weachieve this by having a small fraction of randomly selected

RASHEED AND MAHAPATRA: THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORKS WITH MOBILE SINKS 959

Fig. 1. The three-tier security scheme in WSN with mobile sinks.

http://ieeexploreprojects.blogspot.com

Page 3: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

sensor nodes carry a polynomial from the mobile poly-nomial pool. These preselected sensor nodes are called thestationary access nodes. They act as authentication accesspoints for the network and trigger sensor nodes to transmittheir aggregated data to the mobile sinks. A mobile sinksends data request messages to the sensor nodes via astationary access node. The mobile sink’s data request messageswill initiate the stationary access node to trigger sensor nodesto transmit their aggregated data to the requested sink. Eachstationary access node may share a mobile polynomial with amobile sink. All sensor nodes, including the stationary accessnodes, randomly select a subset of polynomials from thestatic polynomial pool. The advantage of using separatepools is that mobile sink authentication is independent ofthe key distribution scheme used to connect the sensornetwork. We divide our scheme into two stages: static andmobile polynomial predistribution and key discoverybetween a mobile sink and a sensor node.

Stage 1 (Static and mobile polynomial predistribution).

Stage 1 is performed before the nodes are deployed. Amobile polynomial pool M of size jMj and a staticpolynomial pool S of size jSj are generated along with thepolynomial identifiers. All mobile sinks and stationary accessnodes are randomly given Km and one polynomial (Km > 1)from M. The number of mobile polynomials in every mobilesink is more than the number of mobile polynomials inevery stationary access node. This assures that a mobile nodeshares a common mobile polynomial with a stationary accessnode with high probability and reduces the number ofcompromised mobile polynomials when the stationary accessnodes are captured. All sensor nodes and the preselectedstationary access nodes randomly pick a subset of Ks andKs � 1 polynomials from S. Fig. 2 shows the key discoverybetween the mobile node and stationary node.

Stage 2 (Key discovery between mobile node and

stationary node). To establish a direct pairwise keybetween sensor node u and mobile sink v, a sensor nodeu needs to find a stationary access node a in its neighborhood,such that, node a can establish pairwise keys with bothmobile sink v and sensor node u. In other words, astationary access node needs to establish pairwise keys withboth the mobile sink and the sensor node. It has to find acommon mobile polynomial with the mobile sink and acommon static polynomial with the sensor node. Todiscover a common mobile/static polynomial, a sensornode i may broadcast a list of polynomial IDs, oralternatively, an encryption list �;EKvð�Þ; v ¼ 1; . . . ; jKsij,where Kv is a potential pairwise key and the other nodemay have as suggested in [12] and [13]. When a directsecure path is established between nodes u and v, mobile

sink v sends the pairwise key Kc to node a in a messageencrypted and authenticated with the shared pairwise keyKv;a between v and a. If node a receives the above messageand it shares a pairwise key with u, it sends the pairwisekey Kc to node u in a message encrypted and authenticatedwith pairwise key Ka;u between a and u.

If the direct key establishment fails, the mobile sink andthe sensor node will have to establish a pairwise key withthe help of other sensor nodes. To establish a pairwise keywith mobile sink v, a sensor node u has to find a stationaryaccess node a in its neighborhood such that node a canestablish a pairwise key with both nodes u and v. If node aestablishes a pairwise key with only node v and not with u.As the probability is high that the access node a can discovera common mobile polynomial with node v, sensor node uneeds to find an intermediate sensor node i along the pathu� i� a� v, such that intermediate node i can establish adirect pairwise key with node a.

3.1 Security Analysis

We have analyzed the performance of the proposed schemeusing two metrics: security and connectivity [19]. Forsecurity, we present the probability of a mobile polynomialbeing compromised; hence, an attacker can make use of thecaptured mobile polynomial to launch a mobile sinkreplication attack against the sensor network. In connectiv-ity, we estimate the probability Pconn (see Appendix A fordetailed derivation, which can be found on the ComputerSociety Digital Library at http://doi.ieeecomputersociety.org/10.1109/TPDS.2010.185) of a mobile sink establishingsecure links with the sensor nodes from any authenticationaccess point in the network as

Pconn ¼ 1� 1� c

n

� �m; ð1Þ

where n represents the total number of sensor nodes in thenetwork, c is the average number of neighbor nodes forevery sensor node before deployment of the stationary accessnodes, and m is the number of stationary access nodes in thenetwork. Fig. 3 shows Pconn versus the ratio of stationaryaccess nodes.

The probability that a mobile sink and a stationary accessnode share a mobile polynomial—in other words, theprobability Pm; the mobile sink, and stationary access nodecan establish a key directly—is expressed by

960 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012

Fig. 2. (a) Direct key discovery. (b) Indirect key discovery throughintermediate stationary node i. (c) Indirect key discovery throughintermediate stationary access node i.

Fig. 3. The probability Pconn that a sensor has at least one stationaryaccess node in its neighborhood versus the ratio of access nodes.

http://ieeexploreprojects.blogspot.com

Page 4: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

Pm ¼Km

jMj: ð2Þ

The probability Ps, where two sensor nodes share a

common static polynomial—the probability that the two

sensors can establish a secure link directly is estimated by

Ps ¼ 1�

jSj2Ks

� �� 2Ks

Ks

� �jSjKs

� �2: ð3Þ

The probability Psa, where a sensor node and a stationary

access node share a common static polynomial—the prob-

ability that the two nodes can establish a pairwise key

directly—is estimated by

Psa ¼ 1�

jSj2Ks � 1

� �� 2Ks � 1

Ks � 1

� �jSjKs

� �� jSj

Ks � 1

� � : ð4Þ

The probability Pa, where two stationary access nodes share a

common static/mobile polynomial, is estimated by

Pa ¼ 1�jMj � 1ð Þ � jSj

2 � ðKs � 1Þ

� �� 2 � ðKs � 1Þ

Ks � 1

� �

jMj � jSjKs � 1

� �2: ð5Þ

Fig. 4 shows the relationship between the probability Psaand the combination of jSj and Ks, respectively. Fig. 5

shows the probability Pa with various combinations of

jSj; Ks, and jMj.All figures clearly show that the closer jSj and Ks are

the more likely two sensor nodes can establish a pairwise

key directly.The probability Pd (see Appendix B, in the online

supplemental material, for detailed derivation) of a mobile

sink and a sensor node establishing a pairwise key (directly

or indirectly) can be estimated by

Pd ¼ 1� ð1� PsaPmÞg:ð1� PmPsaPsÞg:d:ð1� PmPaPsaÞgðg�1Þ;

where d denotes the average number of neighbors that a

sensor can contact, and g denotes the average number of

stationary access nodes that the node has in its neighborhood.Figs. 6 and 7 show the relationship between Pd versus d andthe combinations of g and Pm; respectively.

3.2 Threat Analysis

In this section, we analyze the security performance of theproposed scheme against a mobile sink replication attack. Asstated in the previous section, for an attacker to launch amobile sink replication attack on the network, the adversaryhas to compromise at least one polynomial from the mobilepolynomial pool. To achieve this, the adversary mustcapture at least a specific number of stationary access nodesthat hold the same mobile polynomial. It follows from thesecurity analysis of the Blundo scheme, that for anypolynomial w in the mobile polynomial pool of degree tm,an attacker cannot recover the polynomial w, if no morethan tm stationary access nodes that had chosen w arecaptured by the attacker. If more than tm stationary accessnodes with w as their mobile polynomial are captured by theattacker, then the attacker can recover the mobile poly-nomial w, and thus be able to launch a mobile sink replicationattack against the sensor network. We assume that anattacker randomly captures Rc sensor nodes, Rc > tm. Tosimplify our estimation for the probability Pr of a mobilepolynomial being compromised, we consider the capturesof sensor nodes are independent. Now let w be apolynomial in the mobile pool. The probability of w beingchosen for a stationary access node is 1

jMj, the probability thatany captured node is a stationary access node is m

n , and the

RASHEED AND MAHAPATRA: THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORKS WITH MOBILE SINKS 961

Fig. 4. The probability Psa that a sensor and stationary access nodeshare a static polynomial versus the size jSj.

Fig. 6. The probability Pd of a mobile sink establishing a pairwise keywith a sensor node versus the number of sensor neighbors d.

Fig. 5. The probability Pa that two sensors share a static or a mobilepolynomial versus the size jSj.

http://ieeexploreprojects.blogspot.com

Page 5: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

probability that a captured node is a stationary access nodeand it hold w is 1

jMj � mn . Therefore, the probability that this

polynomial being chosen exactly by x stationary access nodesamong Rc captured nodes is

P ðxÞ ¼ Rc

x

� �� 1

jMj �m

n

� �x� 1� 1

jMj �m

n

� �Rc�x: ð6Þ

Thus, the probability that any polynomial from the mobilepool being recovered by an attacker is Pr ¼ 1�

Ptmx¼0 P ðxÞ.

Fig. 8 shows the probability Pr when two separatepolynomial pools are used and compares it with the caseof a single polynomial pool approach. The figure clearlyshows that an attacker must capture many more sensors inthis scheme than in the single polynomial pool approach.

4 THE ENHANCED THREE-TIER SECURITY SCHEME

As described in the previous section, the three-tier securityscheme provides better network resilience against mobilesink replication attack compared to the single polynomialpool approach. This scheme delivers the same securityperformance as the single polynomial pool approach whenthe network is under a stationary access node replicationattack. In both schemes, for any sensor node u that needs toauthenticate and establish a pairwise key with a stationaryaccess node A, the two nodes must share at least a commonpolynomial in their polynomial rings. To perform astationary access node replication attack on a network, theadversary needs to compromise at least a single polynomialfrom the static pool. This can be obtained easily bycapturing arbitrary sensor nodes in the network. Then, theadversary can make use of this compromised polynomial

by a replicated stationary access node to enable insecureaccess to the network. When successful access to thenetwork has been obtained through the compromised staticpolynomial, the replicated stationary access node transmitsrecorded mobile sink data request messages. Next, thesensor nodes that have the compromised polynomial intheir rings will insecurely authenticate and establish apairwise key with the replcated node and thus deliver theirdata to the replicated node.

In this section, we remedy the security performance ofthe proposed scheme in the case of a stationary access nodereplication attack. We use a one-way hash chain [20] algorithmin conjunction with the polynomial pool scheme. Inaddition to the static polynomial, a pool of randomlygenerated passwords is used to enhance the authenticationbetween sensor nodes and stationary access nodes.

In the enhanced security scheme, each sensor node, such asu, is preloaded with a subset of Ks polynomials randomlychosen from the static pool jSj. In addition to theKs preloadedstatic polynomials, node u randomly picks a subset of Gspasswords from the password pool jW j. Subsequently, foreach of theGs password Pwi that has been randomly chosenby node u, its rth hash value, HrðPwiÞ, is loaded into node u.Each password is blinded with the use of a collision-resistanthash function such as MD5 [22]. Due to the collision-resistantproperty, it is computationally infeasible for an attacker tofind a value Pwx, such that HðPwyÞ ¼ HðPwxÞ; Pwx 6¼ Pwy.For stationary access nodes, each node is preloaded withKs � 1static polynomials and Ga hash values (Hr�1ðPwiÞÞ for therandomly chosen passwords from the pool jW j.

To establish an authentication between a sensor nodeand a stationary access node in the enhanced scheme, the two

962 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012

0 1000 2000 3000 4000 5000 6000 7000 8000 9000 100000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1.1

# of compromised sensor nodes

Pr

RS(|M| =7, t =100)PS(|M| =7, t

m =100, m/n =0.08)

PS(|M| =7, tm

=100, m/n =0.1)

PS(|M| =7, tm

=100, m/n =0.15)

PS(|M| =7, tm

=100, m/n =0.2)

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2x 104

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

1.1

# of compromised sensor nodes

Pr

RS(|M| =11, t =100)PS(|M| =11, t

m =100, m/n =0.08)

PS(|M| =11, tm

=100, m/n =0.1)

PS(|M| = 11, tm

=100, m/n =0.15)

PS(|M| = 11, tm

=100, m/n =0.2)

(a) (b)

Fig. 8. The probability Pr that any polynomial from the mobile polynomial pool is being recovered. PS and RS refer to the proposed scheme and thesingle polynomial approach, respectively.

0 10 20 30 40 50 600

0.2

0.4

0.6

0.8

1 P

s=0.37, P

sa=0.2, P

a=0.22, g=1

d

Pd

Pm

= 0.1

Pm

= 0.2

Pm

= 0.3

Pm

= 0.5

0 10 20 30 40 50 600

0.2

0.4

0.6

0.8

1

d

Pd

Ps=0.6, P

sa=0.33, P

a=0.28, g=1

Pm

= 0.1

Pm

= 0.2

Pm

= 0.3

Pm

= 0.5

(a) (b)

Fig. 7. The probability Pd of a mobile sink establishing a pairwise key with a sensor node versus the number of sensor neighbors d.

http://ieeexploreprojects.blogspot.com

Page 6: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

must share a common static polynomial. Also, they need todiscover at least a single access node verification ofHðHr�1ðPwiÞÞ ¼ HrðPwiÞ for which both the sensor nodeand the stationary access node have the same password Pwi,randomly chosen from the pool jW j. In the access nodeverification, to verify the authenticity of a stationary accessnode, the sensor node performs a single hash operation onthe hash value that is sent from the stationary access node.

4.1 Security Analysis

Similar to the security analysis presented in Section 3.1,we evaluate the connectivity of the enhanced three-tiersecurity scheme. We estimated the Pconn, verified byHðHr�1ðPwiÞÞ ¼ HrðPwiÞ, where Hr�1ðPwiÞ and HrðPwiÞare the preloaded hash values of Pwi in each of stationaryaccess nodes and the sensor nodes, respectively. Thus,

Pconn ¼ 1� 1� p� c

n

� �m; ð7Þ

where p is the probability that a stationary access node and asensor node share at least a common chosen password foraccess node verification

p ¼ 1�

jW jGsþGa

� �� GsþGa

Gs

� �jW jGs

� �� jW j

Ga

� � : ð8Þ

For different node densities c ¼ 10, c ¼ 20, c ¼ 60, andc ¼ 120, Fig. 9 shows the probability Pconn versus the ratio ofstationary access nodes and the probability p. All figuresclearly indicate that for a given stationary access node ratio of

�, and a node density c, the probability of connectivityincreases as p increases.

We also estimated the probability Pg of the mobile sinkbeing connected directly or indirectly to a sensor node viaa stationary access node that shared with the sensor node, atleast one common static polynomial and a commonchosen password Pwi, for which the node was able toverify the access node by HðHr�1ðPwiÞÞ ¼ HrðPwiÞ. Todrive the probability Pg, we used a similar analysis as thatused for the estimation of probability Pd, except that nosensor neighbor could act as an intermediate node; thus,Pg could be estimated by

Pg ¼ 1� ð1� pPsaPmÞg � ð1� pPmPaPsaÞgðg�1Þ: ð9Þ

Fig. 10 shows probability Pg under the given probabil-ities of Psa; Pa; Pm, and p versus the average number ofstationary access nodes g in a sensor neighborhood.

4.2 Threat Analysis

In the stationary access node replication attack, the adversaryneeds to capture at least one polynomial from the static pooland at least one hash value Hr�1() of a chosen password. Toanalyze the security performance of the enhanced three-tierscheme, we estimated probability Php of a noncompromisedsensor node being under a stationary access node replicationattack, when x number of nodes were being captured. Tocalculate the probability Php for a noncompromised sensornode that had a hash value HrðPwiÞ in its hash value ringand static polynomial y in its static polynomial ring, wewere required to obtain the probabilities of both Hr�1ðPwiÞand polynomial y, as they were being compromised whenthe x nodes were captured.

RASHEED AND MAHAPATRA: THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORKS WITH MOBILE SINKS 963

Fig. 9. The probability Pconn for various node density versus the ratio of stationary access nodes and the probability p that a sensor and a stationaryaccess node share at least a common chosen password. (a) c ¼ 10; n ¼ 1;000. (b) c ¼ 20; n ¼ 1;000. (c) c ¼ 120; n ¼ 1;000.

Fig. 10. Probability Pg versus probability Pm and the average number of stationary access nodes g in sensor neighborhood.

http://ieeexploreprojects.blogspot.com

Page 7: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

The probability Ph that a given hash value is not chosen

by a noncompromised stationary access node is 1� Gajwj � m

n . If

there are x compromised nodes, the probability that a given

hash value Hr�1ðPwiÞ is not captured is ð1� Gajwj � m

nÞx. As in,

the probability of the hash value being captured is, thus,

Ph ¼ 1� 1� Ga

jW j �m

n

� �x: ð10Þ

Fig. 11 shows the probability of a hash value Hr�1()

being compromised versus the number of captured nodes.

From these figure, we observed that the probability Phincreased dramatically as we increased the ratio of the

stationary access nodes from 1 to 8 percent. In the case of

the captured static polynomial y of degree t, the attacker

cannot determine the noncompromised static polynomial-

based key, if no more than t nodes have been captured.

Similar to the analysis in [14], let us assume a case where

the number of compromised sensors x > t. The probability

of any polynomial being chosen for a sensor node is Ks

jSj, and

the probability of this polynomial being chosen exactly j

times among x nodes is

P ðjÞ ¼ xj

� �� Ks

jSj

� �j� 1�Ks

jSj

� �x�j: ð11Þ

Thus, the probability of polynomial y being compromised is

Pp ¼ 1�Xj¼tj¼0

pðjÞ: ð12Þ

From (10) and (12), the probability, Php that a non-compromised sensor node is under a stationary access node

replication attack can, thus, be estimated by

Php ¼ 1�Xj¼tj¼0

pðjÞ !

� 1� 1� Ga

jW j �m

n

� �x� �: ð13Þ

Fig. 12 shows probability Php of a noncompromised

sensor node being under a stationary access node replication

964 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 5, MAY 2012

Fig. 11. The probability Ph of hash value being compromised versus the number of compromised nodes under different stationary accessnode ratio m

n .

Fig. 12. The probability Php of a noncompromised sensor node under a stationary access node replication attack.

http://ieeexploreprojects.blogspot.com

Page 8: The Three-Tier Security Scheme in Wireless Sensor Networks With Mobile Sinks.bak

attack. The figure clearly indicates that for low fraction ofstationary access node ðmn ¼ 0:01; mn ¼ 0:02Þ, the enhancedthree-tier security scheme has a better security performancein terms of network resilience to stationary access nodereplication attack than the previously proposed scheme. Foraccess node ratios greater than 2 percent, both versions of thethree-tier security scheme have a similar network resiliencyagainst access node replication attacks.

5 CONCLUSION

In this paper, we proposed a general three-tier securityframework for authentication and pairwise key establish-ment between mobile sinks and sensor nodes. The proposedscheme, based on the polynomial pool-based key predis-tribution scheme substantially improved network resilienceto mobile sink replication attacks compared to the singlepolynomial pool-based key predistribution approach [14].Using two separate key pools and having few stationaryaccess nodes carrying polynomials from the mobile pool inthe network may hinder an attacker from gathering sensordata, by deploying a replicated mobile sink. Analysisindicates that with 10 percent of the sensor nodes in thenetwork carrying a polynomial from the mobile pool, forany mobile polynomial to be recovered, the attacker wouldhave to capture 20.8 times more nodes as compared to thesingle polynomial pool approach. We have further im-proved the security performance of the proposed schemeagainst stationary access node replication attack by strengthen-ing the authentication mechanism between stationary accessnodes and sensor nodes. We used the one-way hash chainsalgorithm [20] in conjunction with the static polynomialpool-based scheme [14].

REFERENCES

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci,“Wireless Sensor Networks: A Survey,” Computer Networks,vol. 38, no. 4, pp. 393-422, 2002.

[2] T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm, “VitalSigns Monitoring and Patient Tracking over a Wireless Network,”Proc. IEEE 27th Ann. Int’l Conf. Eng. Medicine and Biology Soc.(EMBS), Sept. 2005.

[3] L. Hu and D. Evans, “Using Directional Antenna to PreventWormhole Attacks,” Proc. Network and Distributed System SecuritySymp., 2004.

[4] J.R. Douceur, “The Sybil Attack,” Proc. First Int’l Workshop Peer-to-Peer Systems (IPTPS ’02), Mar. 2002.

[5] B.J. Culpepper and H.C. Tseng, “Sinkhole Intrusion Indicators inDSR MANETs,” Proc. First Int’l Conf. Broadband Networks (Broad-Nets ’04), pp. 681-688, Oct. 2004.

[6] H. Deng, W. Li, and D.P. Agrawal, “Routing Security in WirelessAd Hoc Networks,” Proc. IEEE Comm. Magazine, pp. 70-75, 2002.

[7] C. Intanagonwiwat, R. Govindan, and D. Estrin, “DirectedDiffusion: A Scalable and Robust Communication Paradigm forSensor Networks,” Proc. MobiCom, pp. 56-67, 2000.

[8] A. Kansal, A. Somasundara, D. Jea, M. Srivastava, and D. Estrin,“Intelligent Fluid Infrastructure for Embedded Networks,” Proc.Second ACM Int’l Conf. Mobile Systems, Applications, and Services(MobiSys ’04), June 2004.

[9] Y. Tirta, Z. Li, Y. Lu, and S. Bagchi, “Efficient Collection ofSensor Data in Remote Fields Using Mobile Collectors,” Proc.13th Int’l Conf. Computer Comm. and Networks (ICCCN ’04), Oct.2004.

[10] A. Rasheed and R. Mahapatra, “An Energy-Efficient Hybrid DataCollection Scheme in Wireless Sensor Networks,” Proc. Third Int’lConf. Intelligent Sensors, Sensor Networks and Information Processing,2007.

[11] W. Zhang, G. Cao, and T. La Porta, “Data Dissemination withRing-Based Index for Wireless Sensor Networks,” Proc. IEEE Int’lConf. Network Protocols (ICNP), pp. 305-314, Nov. 2003.

[12] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme forDistributed Sensor Networks,” Proc. ACM Conf. Computer Comm.Security (CCS ’02), pp. 41-47, 2002.

[13] H. Chan, A. Perrig, and D. Song, “Random Key Pre-DistributionSchemes for Sensor Networks,” Proc. IEEE Symp. Research inSecurity and Privacy, 2003.

[14] D. Liu, P. Ning, and R.Li. Establishing, “Pairwise Keys inDistributed Sensor Networks,” Proc. 10th ACM Conf. Computersand Comm. Security (CCS ’03), pp. 52-61, Oct. 2003.

[15] H. Chan, A. Perrig, and D. Song, “Key Distribution Techniques forSensor Networks,” Wireless Sensor Networks, pp. 277-303, KluwerAcademic, 2004.

[16] D. Liu and P. Ning, “Location-Based Pairwise Key Establishmentsfor Static Sensor Networks,” Proc. First ACM Workshop Security AdHoc and Sensor Networks, 2003.

[17] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient SecurityMechanisms for Large-Scale Distributed Sensor Networks,” Proc.10th ACM Conf. Computers and Comm. Security (CCS ’03), pp. 62-72,Oct. 2003.

[18] A. Rasheed and R. Mahapatra, “An Efficient Key DistributionScheme for Establishing Pairwise Keys with a Mobile Sink inDistributed Sensor Networks,” Proc. IEEE 27th Int’l PerformanceComputing and Comm. Conf. (IPCCC ’08), pp. 264-270, Dec. 2008.

[19] A. Rasheed and R. Mahapatra, “A Key Pre-Distribution Schemefor Heterogeneous Sensor Networks,” Proc. Int’l Conf. WirelessComm. and Mobile Computing Conf. (IWCMC ’09), pp. 263-268,June 2009.

[20] L. Lamport, “Password Authentication with Insecure Commu-nication,” Comm. ACM, vol, 24, no. 11, pp. 770-772, Nov. 1981.

[21] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, andM. Yung, “Perfectly-Secure Key Distribution for Dynamic Con-ferences,” Proc. 12th Ann. Int’l Cryptology Conf. Advances inCryptology (CRYPTO ’92), pp. 471-486, 1993.

[22] R. Rivest, “The MD5 Message-Digest Algorithm,” RFC 1321,Apr. 1992.

Amar Rasheed received the MS degree incomputer science from Northeastern IllinoisUniversity, Chicago, in 2005. Currently, he isworking toward the PhD degree in computerscience and engineering at Texas A&M Uni-versity, College Station. His research interestsinclude wireless sensor networks, cryptographicalgorithms for sensor networks, securityschemes in mobile sensor networks, and keypredistribution schemes. He is a student mem-ber of the IEEE.

Rabi N. Mahapatra is an associate professorwith the Department of Computer Science andEngineering at Texas A&M University, CollegeStation, where he has been directing the Code-sign Embedded Systems Research Group since2001. His current research interests includeembedded systems, low-power design, securesensor networks, semantic routing, system-on-chip (SoC), and (VLSI). He is the author/coauthor of more than 100 research papers in

referred international journals/conferences. His research has beenfunded by the US National Science and Foundation (NSF), DoT,National Aeronautics and Space Administration (NASA). He is a seniormember of the IEEE.

. For more information on this or any other computing topic,please visit our Digital Library at www.computer.org/publications/dlib.

RASHEED AND MAHAPATRA: THE THREE-TIER SECURITY SCHEME IN WIRELESS SENSOR NETWORKS WITH MOBILE SINKS 965

http://ieeexploreprojects.blogspot.com